Back to skill
Skillv1.0.1
VirusTotal security
cs-autoresponder · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:09 AM
- Hash
- 7a4ce81a8658efdaedf0dd42c7e5ff3f95b5bb1f44fb824e2e2a37c0cf3c447c
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: cs-autoresponder Version: 1.0.1 The skill bundle contains patterns that facilitate Remote Code Execution (RCE) vulnerabilities. Specifically, 'lib/channels.js' and 'scripts/escalate.js' include commented-out examples and documentation suggesting the use of 'child_process.exec' to run local CLI tools (e.g., 'insta-cli/v2.js') using unsanitized user input from customer messages. While these are currently placeholders for 'Production' use, they provide a blueprint for a high-risk shell injection vulnerability. Additionally, the code contains hardcoded developer environment paths ('/Users/mupeng/...') and lacks input validation for data passed to shell-adjacent functions.
- External report
- View on VirusTotal
