imgnAI Katana API

Security checks across static analysis, malware telemetry, and agentic risk

Overview

No artifact-backed suspicious behavior could be confirmed because the local artifact inspection commands failed before any files could be read.

Treat this as an incomplete low-confidence review: the only negative signal provided was VirusTotal telemetry, and the workspace artifacts could not be inspected in this run.

Publisher note

This skill uses curl to call the imgnAI Katana API (kat.imgnai.com) for image, video, and text generation. Network access is required for all API operations. Credentials (KATANA_API_KEY, KATANA_API_SECRET) are read from a local secrets file and sent as Bearer auth headers to kat.imgnai.com only. Optional ffmpeg usage for local video post-processing. No data is sent to any other endpoint.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal vendor engines reported 1 malicious and 0 suspicious detection(s) for this artifact. ClawHub treats this as telemetry for risk analysis, not as a standalone blocking verdict.

Malicious
1
Suspicious
0
Harmless
0
Undetected
62
View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.