Back to skill
Skillv1.0.2

VirusTotal security

视频去除水印 · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 18, 2026, 3:31 PM
Hash
75a53b20ab403a55de13f6d5bb7d4d52914aa1b338cfcf4b72f1958f82cbdb47
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: midea-nomark Version: 1.0.2 The skill relies entirely on the execution of opaque, pre-compiled binaries located in the 'assets/' directory (e.g., parse-video-darwin-arm64). While the provided shell scripts (scripts/parse.sh and scripts/serve.sh) are simple wrappers for these binaries, the core logic is hidden and not open-source, which poses a risk of unauthorized network activity or data exfiltration. The inclusion of a 'serve' command that opens a local HTTP port further increases the attack surface without visibility into the binary's internal behavior.
External report
View on VirusTotal