Back to skill
Skillv1.0.2
VirusTotal security
视频去除水印 · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 18, 2026, 3:31 PM
- Hash
- 75a53b20ab403a55de13f6d5bb7d4d52914aa1b338cfcf4b72f1958f82cbdb47
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: midea-nomark Version: 1.0.2 The skill relies entirely on the execution of opaque, pre-compiled binaries located in the 'assets/' directory (e.g., parse-video-darwin-arm64). While the provided shell scripts (scripts/parse.sh and scripts/serve.sh) are simple wrappers for these binaries, the core logic is hidden and not open-source, which poses a risk of unauthorized network activity or data exfiltration. The inclusion of a 'serve' command that opens a local HTTP port further increases the attack surface without visibility into the binary's internal behavior.
- External report
- View on VirusTotal
