Back to skill
Skillv1.5.0

VirusTotal security

qwenspeak · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 3:54 AM
Hash
bdbb5b32975031aa481aeacdcab07174cc51814bf257dac00fac8b240ec870b2
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: qwenspeak Version: 1.5.0 The `scripts/qwenspeak.sh` file contains a critical shell injection vulnerability (Remote Code Execution). It uses `exec ssh ... "$*"`, which directly passes all arguments from the local shell to the remote SSH server for execution without proper sanitization, allowing arbitrary commands to be run on the remote host as the `tts` user. This flaw, combined with the file manipulation capabilities described in `SKILL.md` (e.g., `put`, `get`, `remove-file`, `search-files`), could be exploited by a malicious prompt or compromised agent to exfiltrate data, install backdoors, or perform other unauthorized actions on the remote server.
External report
View on VirusTotal