Back to skill
Skillv1.3.0
VirusTotal security
Jentic WhatsApp QR · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 30, 2026, 5:00 AM
- Hash
- ffc43b8d8de99b698d65a2f8f0f47bc77338046042493e7ba5889198b6d58619
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: jentic-whatsapp-qr Version: 1.3.0 The skill is classified as suspicious due to its direct instruction to the AI agent to read a sensitive configuration file (`/root/.openclaw/openclaw.json`) to extract an API token, as seen in `SKILL.md`. While this token (`JENTIC_MM_SHIRKA_TOKEN`) is used for the stated purpose of delivering the QR code via Mattermost to `https://mattermost.claw.jentic.ai`, the capability to access such sensitive files and make external network calls represents a significant vulnerability if the agent could be prompted to read other secrets or exfiltrate data to arbitrary endpoints. The code itself (`generate_qr.py`, `qr_decode.py`) appears to be functional and not inherently malicious, but the agent's instructions in `SKILL.md` demonstrate risky capabilities.
- External report
- View on VirusTotal
