Back to skill
Skillv1.9.72

VirusTotal security

Wip Readme Format · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 29, 2026, 5:51 AM
Hash
76ca248c0306ff5f4acc1b49615fe1157eb4a66d424f30d2ea5f164e6d75b03b
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: wip-readme-format Version: 1.9.72 The skill bundle contains a shell injection vulnerability in `format.mjs` within the `--deploy` command logic. The script uses `execSync` to run git commands on filenames retrieved directly from the filesystem via `readdirSync` without sanitization, which could allow arbitrary command execution if a crafted filename (e.g., containing shell metacharacters) is present in the repository. While the tool's stated purpose of reformatting README files is consistent with its logic and the 'Teach Your AI' prompt instructions are standard for agent-native onboarding, this vulnerability represents a significant security flaw.
External report
View on VirusTotal