Back to skill
Skillv1.0.1
VirusTotal security
Near Subaccount · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 3:34 AM
- Hash
- b9faf13565942d38c735a3ae4c31bd9ddfbc2e53bf1fe18fd1845985f3175acf
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: near-subaccount Version: 1.0.1 The `scripts/subaccount.js` file uses `child_process.exec` to run NEAR CLI commands and `fs.promises.readFile` to read a JSON file. While these capabilities are necessary for the skill's stated purpose, the script does not perform explicit input sanitization on arguments passed to `execAsync` (e.g., `subaccountName`, `masterAccount`, `accountId`), making it vulnerable to command injection if malicious input is provided by the agent or user. Furthermore, the `bulkDistribute` function allows reading an arbitrary file path (`filePath`) specified by the user, which could be exploited for data exfiltration of sensitive local files (e.g., `~/.ssh/id_rsa`, `/etc/passwd`) if the agent is prompted to do so. There is no clear evidence of intentional malicious behavior, but the high-risk capabilities and lack of input sanitization make it suspicious.
- External report
- View on VirusTotal
