Back to skill
Skillv2.0.0

VirusTotal security

Android SMS Gateway · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 29, 2026, 4:23 AM
Hash
f3ed2f120a56080574be0a0df3b8e541bcb9e3b5a79e3eb3afab3cf3c0083a97
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: android-sms-gateway Version: 2.0.0 The skill is designed for a legitimate purpose (Android SMS gateway). However, the shell scripts (`bulk_sms.sh`, `bulk_sms_capcom6.sh`, `send_sms.sh`, `send_sms_capcom6.sh`, `receive_sms.sh`, `register_webhook_capcom6.sh`, `check_status_capcom6.sh`) exhibit multiple critical shell injection vulnerabilities. User-controlled inputs (e.g., `--message`, `--to`, `--url`, `--since`, `--id`, `--user`, `--pass`) are directly interpolated into JSON payloads, URL query parameters, URL paths, and basic authentication strings without proper escaping. This allows for arbitrary command execution if an attacker can control the input arguments passed to these scripts. While these are severe vulnerabilities, they represent implementation flaws rather than clear evidence of intentional malicious behavior by the skill developer.
External report
View on VirusTotal