imgnAI Katana API
Security checks across static analysis, malware telemetry, and agentic risk
Overview
No artifact-backed suspicious behavior could be confirmed because the local artifact inspection commands failed before any files could be read.
Treat this as an incomplete low-confidence review: the only negative signal provided was VirusTotal telemetry, and the workspace artifacts could not be inspected in this run.
Publisher note
This skill uses curl to call the imgnAI Katana API (kat.imgnai.com) for image, video, and text generation. Network access is required for all API operations. Credentials (KATANA_API_KEY, KATANA_API_SECRET) are read from a local secrets file and sent as Bearer auth headers to kat.imgnai.com only. Optional ffmpeg usage for local video post-processing. No data is sent to any other endpoint.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal vendor engines reported 1 malicious and 0 suspicious detection(s) for this artifact. ClawHub treats this as telemetry for risk analysis, not as a standalone blocking verdict.
- Malicious
- 1
- Suspicious
- 0
- Harmless
- 0
- Undetected
- 62
Risk analysis
No visible risk-analysis findings were reported for this release.
