Back to skill
Skillv1.0.0

VirusTotal security

AES EMR YARN Analyzer · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 29, 2026, 6:21 AM
Hash
2d37aff75e561296ceb5e2b1b64bf86b0a7610619ea3177505d2ee08fdc9d064
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: aes-emr-yarn Version: 1.0.0 The skill bundle contains hardcoded sensitive credentials, including an Aliyun AccessKey ID/Secret and SSH root passwords, both in 'config/config.yaml' and as fallback defaults in 'scripts/analyze_yarn.py'. The script is designed to execute shell commands via SSH on a specific hardcoded IP address (8.136.137.42). While the logic aligns with the stated purpose of YARN resource analysis, the inclusion of active-looking credentials and the use of SSH for remote command execution on a predefined host pose significant security risks, even though no explicit data exfiltration to an external attacker-controlled domain was found.
External report
View on VirusTotal