Back to skill
Skillv1.2.0
VirusTotal security
Claude Code Control · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:17 AM
- Hash
- 914c8d6597a5ed1685408215ca80238102ec049d06a4dc59cae89b9db960911a
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: claude-code-control Version: 1.2.0 The skill is classified as suspicious due to critical shell injection vulnerabilities present in its core functionality across multiple implementations, including the main `index.js` file. The `send` function in `index.js` executes user-provided commands by simulating keystrokes into a visible Terminal.app window, which can be exploited to run arbitrary shell commands (e.g., `echo hello; rm -rf /`). Similarly, the `launch` function in `index.js` interpolates the `projectPath` directly into a shell command executed via AppleScript's `do script`, posing another shell injection risk. These vulnerabilities are exacerbated by the skill's explicit requirement for macOS Accessibility permissions, granting it high privileges to control the user's system GUI. While there is no evidence of intentional malicious behavior (like data exfiltration or backdoor installation) within the skill's code, these severe vulnerabilities enable remote code execution if the inputs (`command`, `projectPath`) are not properly sanitized by the calling agent or user.
- External report
- View on VirusTotal
