Back to skill
Skillv2.0.2
VirusTotal security
Venice API Kit · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewMay 1, 2026, 4:20 AM
- Hash
- a55f07b1d6778e0ffd4fa004cd4178c642ca1dd9927db457c7fb9cdd26b3c5b3
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: venice-api-kit Version: 2.0.2 The skill bundle is generally well-structured and transparent, interacting solely with the stated `https://api.venice.ai` endpoint. However, the Python scripts (e.g., `image_upscale.py`, `embeddings.py`, `transcribe.py`) accept file paths via command-line arguments (`--image`, `--file`, `--output`) and directly use `pathlib.Path` to read from or write to these locations. This design introduces a path traversal vulnerability, allowing a malicious user or a compromised agent to potentially read or write arbitrary files on the host system by providing crafted paths (e.g., `../../../../etc/passwd`). While there is no evidence of intentional malicious behavior (such as exfiltration to unauthorized domains, backdoors, or obfuscation), this vulnerability elevates the classification from benign to suspicious.
- External report
- View on VirusTotal
