CCO / Chief Customer Officer

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: cco Version: 1.0.2 The skill bundle is classified as suspicious due to the explicit instruction in `memory-template.md` for the AI agent to execute shell commands (`mkdir -p ~/cco` and `touch ~/cco/memory.md`). While these specific commands are benign and intended for setup, the direct execution of shell commands from a markdown file by the agent represents a shell injection vulnerability. There is no clear evidence of malicious intent such as data exfiltration or persistence, but the presence of this risky capability warrants a 'suspicious' classification.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Customer metrics, at-risk account names, and expansion opportunities could be stored locally and reused in future conversations.

Why it was flagged

The skill instructs use of a persistent local memory file that may contain customer and business-priority information used in later CCO guidance.

Skill content
Copy to `~/cco/memory.md` on first use... ## Key Accounts at Risk ... ## Expansion Pipeline
Recommendation

Review what is saved in ~/cco/memory.md, avoid unnecessary confidential customer details, and periodically remove or update stale information.