Back to skill
Skillv0.1.0
VirusTotal security
Jackal Memory · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:38 AM
- Hash
- d67cf94e7160c4dc775a0fe5d72a851a01422c9f14b61ad7568b6426c23a540b
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: jackal-memory Version: 0.1.0 The `jackal-memory/client.py` script is vulnerable to URL injection or path traversal. When constructing the `/load/{key}` endpoint, the `key` argument from user input (`sys.argv`) is directly interpolated into the URL path without proper URL encoding. This allows a malicious `key` (e.g., containing '/', '?', or '&') to alter the request path or inject query parameters, potentially leading to server-side vulnerabilities or unexpected client behavior. While this is a vulnerability rather than clear malicious intent, it represents a significant security flaw in input sanitization.
- External report
- View on VirusTotal
