Dangerous exec
- Finding
- Shell command execution detected (child_process).
- Content
// Run whisper transcription with spawnSync (no shell, argument array)
Security checks across static analysis, malware telemetry, and agentic risk
This appears to be a Threema Gateway plugin that asks for the kinds of credentials and capabilities needed to send, receive, encrypt, and transcribe Threema messages.
Before installing, make sure you are comfortable giving this plugin your Threema Gateway secret and E2E private key in OpenClaw configuration, because those are necessary for it to send and decrypt messages. If you enable voice transcription, it will run local Whisper on received audio files. The main thing to double-check is the package/version mismatch in the lockfile, but the observed behavior is consistent with the advertised Threema Gateway plugin purpose.
SkillSpector findings are pending for this release.
// Run whisper transcription with spawnSync (no shell, argument array)
process.env.HOME || "/tmp",
this.secretKey = [REDACTED];
/**
VirusTotal engine telemetry is currently stale for this artifact.