Back to skill
Skillv1.9.72
VirusTotal security
Wip Ai Devops Toolbox Private · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 5:55 AM
- Hash
- 020012008a29cfba8a9e36fbe8fddb04119238b3e03db44802640765d21600f3
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: wip-ai-devops-toolbox Version: 1.9.72 The bundle provides a suite of high-privilege DevOps and automation tools that include extremely intrusive capabilities. Most notably, 'ai/repos/gstack-private/browse/src/cookie-import-browser.ts' contains logic to programmatically decrypt and extract session cookies from multiple macOS browsers (Chrome, Arc, Brave, Edge, Comet) by querying the system Keychain for passwords and decrypting local SQLite databases. While documented as a feature for the 'browse' automation tool, this functionality poses a severe risk of credential theft. Furthermore, the bundle installs multiple 'hooks' (e.g., 'tools/wip-branch-guard/guard.mjs' and 'tools/wip-file-guard/guard.mjs') that intercept and block shell commands and file edits, and 'tools/wip-release/core.mjs' programmatically retrieves npm tokens from 1Password. While these features align with the stated goal of an AI-native DevOps environment, the combination of session hijacking, secret access, and command interception creates a massive attack surface.
- External report
- View on VirusTotal
