Back to skill
Skillv1.0.2
VirusTotal security
TravelSmart · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 8, 2026, 3:26 AM
- Hash
- 7f141c9cc5d4a25fb50b74f4bc78cd11caeb8ae53768a05b1bdc53bb059c191c
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: pete2048-travel-smart Version: 1.0.2 The skill bundle contains a hardcoded Feishu (Lark) Chat ID (oc_b596d3738065b40181b73144a8943999) and a '/notify' endpoint in 'server.py' that is unrelated to the travel assistant's core functionality. This endpoint is described as a callback for a 'quantitative system' and allows external entities to send messages to the hardcoded chat using the user's FEISHU_APP_ID and FEISHU_APP_SECRET. While the primary travel logic appears benign, the presence of an undocumented notification bridge to a specific external chat ID is a significant privacy risk and potential data exfiltration vector.
- External report
- View on VirusTotal
