高风险行为识别分析工具

PassAudited by VirusTotal on May 10, 2026.

Findings (1)

The skill bundle exhibits high-risk behaviors including the use of `subprocess.run` in `skills/smyx_common/scripts/skill.py` to execute the `openclaw` CLI, and a complex request interception mechanism in `util.py` that manages local SQLite storage (`smyx-common-claw.db`) for user tokens. The `SKILL.md` contains specific instructions (prompt injection surface) forcing the AI agent to search local file paths for API keys and use them as identifiers. Additionally, the scripts automatically attempt to register or log in users by sending identifiers, which the documentation suggests are often phone numbers, to remote endpoints at `lifeemergence.com`, creating a significant privacy and security footprint.