Back to skill
Skillv1.0.1

VirusTotal security

Near Subaccount · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 3:34 AM
Hash
b9faf13565942d38c735a3ae4c31bd9ddfbc2e53bf1fe18fd1845985f3175acf
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: near-subaccount Version: 1.0.1 The `scripts/subaccount.js` file uses `child_process.exec` to run NEAR CLI commands and `fs.promises.readFile` to read a JSON file. While these capabilities are necessary for the skill's stated purpose, the script does not perform explicit input sanitization on arguments passed to `execAsync` (e.g., `subaccountName`, `masterAccount`, `accountId`), making it vulnerable to command injection if malicious input is provided by the agent or user. Furthermore, the `bulkDistribute` function allows reading an arbitrary file path (`filePath`) specified by the user, which could be exploited for data exfiltration of sensitive local files (e.g., `~/.ssh/id_rsa`, `/etc/passwd`) if the agent is prompted to do so. There is no clear evidence of intentional malicious behavior, but the high-risk capabilities and lack of input sanitization make it suspicious.
External report
View on VirusTotal