Back to skill
Skillv1.2.0

VirusTotal security

Claude Code Control · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:17 AM
Hash
914c8d6597a5ed1685408215ca80238102ec049d06a4dc59cae89b9db960911a
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: claude-code-control Version: 1.2.0 The skill is classified as suspicious due to critical shell injection vulnerabilities present in its core functionality across multiple implementations, including the main `index.js` file. The `send` function in `index.js` executes user-provided commands by simulating keystrokes into a visible Terminal.app window, which can be exploited to run arbitrary shell commands (e.g., `echo hello; rm -rf /`). Similarly, the `launch` function in `index.js` interpolates the `projectPath` directly into a shell command executed via AppleScript's `do script`, posing another shell injection risk. These vulnerabilities are exacerbated by the skill's explicit requirement for macOS Accessibility permissions, granting it high privileges to control the user's system GUI. While there is no evidence of intentional malicious behavior (like data exfiltration or backdoor installation) within the skill's code, these severe vulnerabilities enable remote code execution if the inputs (`command`, `projectPath`) are not properly sanitized by the calling agent or user.
External report
View on VirusTotal