Back to skill
Skillv1.0.1
VirusTotal security
Wip X · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 30, 2026, 4:19 AM
- Hash
- c9030b8c63f1a4d79410576034ebd494ee938ce883c71101eee5b5ef9dcd1113
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: wip-x Version: 1.0.1 The skill is suspicious due to a Local File Inclusion (LFI) vulnerability in the `upload_media` function, exposed via both `cli.mjs` and `mcp-server.mjs`. The `core.mjs` implementation uses `readFileSync(file_path)` directly with user-controlled input, allowing an attacker or a compromised agent to read arbitrary files on the system. The content of these files is then base64 encoded and sent to the X Platform API, creating a data exfiltration vector. While the `execSync` call in `auth.mjs` for 1Password integration uses a risky function, it appears to be used in a controlled manner for a legitimate purpose and is not the primary concern. The prompt injection in `README.md` is benign and aims to guide the agent's explanation of the tool.
- External report
- View on VirusTotal
