Back to skill
Skillv1.0.0
VirusTotal security
浅草寺.skill · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 14, 2026, 5:42 PM
- Hash
- 99bd7b69606e894eaebfdf8efec0635d4da066ab7b9dea1c2cc809a235545542
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: asakusa-omikuji-skill Version: 1.0.0 The script `scripts/draw_omikuji.py` implements a high-risk 'downloader-executor' pattern. It creates a temporary directory, fetches a Python script and a JSON data file from a remote GitHub repository (raw.githubusercontent.com/Shaozrrr/asakusa-omikuji-skill/main), and then executes the downloaded script using `runpy.run_path`. This behavior allows for arbitrary Remote Code Execution (RCE) and bypasses static analysis of the bundle, though no explicitly malicious payload (like credential theft) is present in the provided code.
- External report
- View on VirusTotal
