Back to skill
Skillv1.0.7

VirusTotal security

volcengine-tts-feishu · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

ReviewMar 30, 2026, 5:01 PM
Hash
30e5adc94edb297ee005911bc65a7137009afc9bd014f00157b1459cb0926b50
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: volcengine-tts-feishu Version: 1.0.7 The skill performs Text-to-Speech synthesis and sends audio to Feishu, but exhibits several high-risk behaviors and vulnerabilities. Specifically, scripts/http_tts.py reads sensitive credentials from the global ~/.openclaw/openclaw.json file and uses subprocess.run to execute curl and ffmpeg, which are high-risk capabilities. The script is also vulnerable to path traversal as it writes to a user-provided --output path without sanitization. Furthermore, there is a discrepancy in requirements.txt, which lists 'websockets' (unused) while omitting the 'requests' library required by the script, and the use of both urllib and requests for API calls to Volcengine and Feishu is inconsistent.
External report
View on VirusTotal