Back to skill
Skillv1.0.0
VirusTotal security
agent-father · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 29, 2026, 4:58 AM
- Hash
- 13e74a4cbc359e3f31c92d5b7cbbaa8c9a6783bdcd9a8a377f8de1b3f1d30d64
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: agent-father Version: 1.0.0 The skill bundle contains critical vulnerabilities due to insufficient input sanitization across multiple scripts. Specifically, `scripts/delete-agent.sh` is vulnerable to path traversal and arbitrary file deletion via `rm -rf "$AGENT_DIR"` if `AGENT_ID` contains `../` sequences, and both `scripts/delete-agent.sh` and `scripts/create-employee.sh` are vulnerable to Node.js script injection (leading to RCE) when user-controlled variables (e.g., `AGENT_ID`, `AGENT_NAME`) are directly interpolated into `node -e` commands without proper escaping. Additionally, `scripts/create-employee.sh` is vulnerable to shell injection when passing unsanitized `AGENT_NAME` to `openclaw` commands, and `scripts/create-feishu-chat.sh` is vulnerable to JSON injection when constructing `curl` payloads. These flaws allow for severe attacks if user input is malicious, but there is no evidence of intentional harmful behavior (e.g., data exfiltration, backdoors) by the skill itself.
- External report
- View on VirusTotal
