Back to skill
Skillv1.0.0
VirusTotal security
Suno AI · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 30, 2026, 6:09 AM
- Hash
- af2631aa8286633bdbc89d889ad56cc8394a71f71a8b66340d89e04592b5b586
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: suno-ai Version: 1.0.0 The skill performs high-risk operations including reading and decrypting the local Chromium cookie database (~/snap/chromium/common/chromium/Default/Cookies) and running a local HTTP server (127.0.0.1:8765) to receive authentication tokens. While these capabilities are documented in SKILL.md as part of a 'browser-backed flow' for Suno AI session recovery and hCaptcha solving, they represent a significant attack surface. The code in browser_session.py specifically implements Chromium cookie decryption using hardcoded fallback credentials (peanuts/saltysalt), and openrouter_provider.py patches external libraries to solve captchas via vision models. No clear evidence of intentional data exfiltration beyond the stated purpose was found, but the level of access to sensitive browser data warrants a suspicious classification.
- External report
- View on VirusTotal
