Hippius Storage

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: hippius Version: 1.0.1 The skill bundle is classified as suspicious due to a shell injection vulnerability in `scripts/query_storage.py`. The script constructs `aws s3` commands using `subprocess.run` where the `bucket` and `prefix` arguments are taken directly from command-line input without sanitization. An attacker controlling these inputs could inject arbitrary shell commands, leading to Remote Code Execution (RCE) on the system running the script. These injected commands would execute with the `HIPPIUS_S3_ACCESS_KEY` and `HIPPIUS_S3_SECRET_KEY` environment variables, potentially compromising credentials or performing unauthorized actions.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the local config or seed phrase is exposed, someone could potentially access or control the user's Hippius account or related storage operations.

Why it was flagged

The skill documents storing Hippius API credentials and an optional blockchain seed phrase locally. That is sensitive account authority, although it is disclosed and tied to Hippius CLI use.

Skill content
Config stored at `~/.hippius/config.json` ... `hippius config set hippius hippius_key "your_hippius_key"` ... `hippius config set substrate seed_phrase "your twelve word mnemonic"`
Recommendation

Prefer scoped S3/API keys where possible, avoid entering a seed phrase unless truly required, protect the config file, and revoke or rotate credentials if they may have been exposed.

What this means

A mistaken command could upload unintended local files, overwrite/download data to the wrong place, or delete objects from Hippius storage.

Why it was flagged

The documented AWS CLI workflows can bulk-upload/sync or delete storage objects. This is expected for a storage-management skill, but wrong paths or buckets could change user data.

Skill content
`aws ... s3 sync ./local-dir/ s3://my-bucket/remote-dir/` ... `aws ... s3 rm s3://my-bucket/file.txt`
Recommendation

Approve only specific bucket names, prefixes, and local paths; require extra confirmation before sync, overwrite, or delete operations.

What this means

Installing the optional CLI runs third-party package code in the user's Python environment.

Why it was flagged

The skill documents an optional unpinned third-party Python package install. It is not automatic and is relevant to the Hippius CLI, but it still introduces normal package-provenance risk.

Skill content
## Installation

```bash
pip install hippius
```
Recommendation

Install optional packages in a virtual environment, verify the package source, and pin versions where practical.

What this means

Account addresses and requested RPC queries could be visible to network observers when using the default RPC URL.

Why it was flagged

The helper script sends RPC account/file/credit queries to a default HTTP endpoint. This is purpose-aligned, but HTTP transport can expose query metadata to the network path.

Skill content
def rpc_call(method: str, params: list, api_url: str = "http://api.hippius.io")
Recommendation

Use an HTTPS RPC endpoint if Hippius provides one, and avoid querying sensitive account/file metadata over untrusted networks.