WebSearch

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: websearch Version: 1.0.0 The skill is classified as suspicious due to a potential shell injection vulnerability in `skill.yaml`. The user-provided `query` input is directly interpolated into the `args` array for the `/usr/local/bin/websearch` command without apparent sanitization or escaping. This could allow an attacker to inject arbitrary shell commands if the `websearch` executable or the underlying execution environment processes the argument string as a shell command, leading to Remote Code Execution (RCE).

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the local websearch executable has been replaced or behaves differently than expected, the skill would run that code when invoked.

Why it was flagged

The skill executes a local helper binary that is not included in the provided artifacts. This is central to the stated purpose, but the trustworthiness of that local command determines what actually runs.

Skill content
exec:
  command: /usr/local/bin/websearch
  args:
    - "{{query}}"
Recommendation

Before installing or using the skill, verify that /usr/local/bin/websearch is present, expected, and maintained by a trusted source.