Virtuoso Product Support

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: virtuoso-support-agent Version: 1.0.0 The skill is classified as suspicious due to multiple high-risk capabilities that are vulnerable to prompt injection and potential exploitation, rather than clear malicious intent. Key indicators include: 1) The `EXECUTE_SQL_SCRIPT` and `execute_sql_query` tools (documented in `SKILL.md` and `references/tool-reference.md`) allow the agent to execute arbitrary SQL commands, posing a significant SQL injection/RCE risk if agent instructions for user approval or script modification are bypassed via prompt injection. 2) The `sparqlRemoteQuery` tool (`references/tool-reference.md`) enables querying arbitrary remote SPARQL endpoints with an optional `apiKey`, creating a data exfiltration vulnerability if the agent is tricked into sending sensitive local data to a malicious URL. 3) The `chatPromptComplete` tool (`references/tool-reference.md`) includes a `file_urls` parameter, allowing the agent to read arbitrary files and pass their content to an LLM, which is a critical information disclosure risk via prompt injection against the agent itself. These powerful capabilities, while potentially necessary for the skill's stated purpose, lack robust, unbypassable safeguards against a malicious user.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken target instance, graph IRI, or generated SQL script could alter or remove production RDF metadata, graphs, or access rules.

Why it was flagged

The skill explicitly exposes database script execution, RDF View drop/sync operations, and other mutation-capable tools on a production instance. This is aligned with the database-management purpose and the workflow asks for confirmations, but it is high-impact.

Skill content
“URIBurner - Production instance” ... “All tools available on both Demo and URIBurner” ... “EXECUTE_SQL_SCRIPT” ... “RDFVIEW_DROP_SCRIPT” ... “RDFVIEW_SYNC_TO_PHYSICAL_STORE”
Recommendation

Before approving any operation, confirm Demo vs. URIBurner, inspect generated scripts, ensure backups or rollback plans exist, and use least-privileged database access where possible.

What this means

If those external MCP tools are present, they may create or inspect remote database connections using parameters outside the documented 23-tool reference.

Why it was flagged

The detailed workflow references additional MCP tools for schema discovery and remote data-source linking that are not part of the main 23-tool list shown in SKILL.md/tool-reference. This appears to be purpose-aligned error recovery, but the actual behavior of those tools is not reviewable from the supplied artifacts.

Skill content
“Tool: `{Server}:database_schema_objects`” ... “Verify remote DSN: `database_remote_datasources` (command: 'list')” ... “link via `database_remote_datasources` (command: 'link')”
Recommendation

Verify the configured MCP servers and tool definitions before using remote data-source linking, and only provide connection details to trusted Virtuoso instances.

What this means

A provided API key could authorize access to a remote endpoint or model provider through the configured MCP tool.

Why it was flagged

The skill can pass API keys to remote SPARQL or LLM-related tools. This is disclosed and no logging, hardcoding, or unrelated credential use is shown, but users should treat those keys as sensitive.

Skill content
“sparqlRemoteQuery” parameters include “url” and optional “apiKey”; “chatPromptComplete” parameters include optional “api_key”.
Recommendation

Use scoped, revocable keys, avoid sharing long-lived administrator credentials, and confirm the endpoint before providing secrets.

What this means

Sensitive database names, query contents, result samples, or credentials could be exposed to remote services if included in those calls.

Why it was flagged

The skill documents remote endpoint and LLM-style tool calls. These are expected for database/query support, but any prompts, queries, or result excerpts sent through them may leave the local conversation boundary depending on MCP configuration.

Skill content
“sparqlRemoteQuery — Execute SPARQL against remote endpoint” ... “graphqlEndpointQuery — Execute GraphQL query against specific endpoint” ... “chatPromptComplete — Use LLM for complex reasoning tasks.”
Recommendation

Use only trusted endpoints and avoid sending secrets or sensitive production data through remote query or LLM tools unless that data flow is approved.