Back to skill
Skillv1.0.2
VirusTotal security
tenk-connect · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewMay 1, 2026, 4:14 AM
- Hash
- 5434e22f2d855ed7e7ad208f7bbfe4f92ee6850119b0dcb75243b16d91f91b78
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: tenk-connect Version: 1.0.2 The skill bundle contains a critical Python code injection vulnerability in `scripts/tenk.sh`. User-controlled input (`skill_query`) is directly interpolated into a Python string within `python3 -c` calls in the `cmd_log` function, allowing for arbitrary Python code execution and potential shell injection (RCE). While this is a severe flaw, there is no clear evidence of intentional malicious behavior such as data exfiltration to unauthorized endpoints, persistence mechanisms, or obfuscation. All network calls are directed to the legitimate `tenk.oventlabs.com` domain, and token handling appears standard. The issue is a lack of input sanitization, classifying it as a vulnerability rather than intentional malware.
- External report
- View on VirusTotal
