VPS Agent Migration

PassAudited by VirusTotal on May 15, 2026.

Findings (1)

The skill is classified as suspicious due to multiple severe vulnerabilities, primarily a critical Remote Code Execution (RCE) risk in `SKILL.md` (Step 3). The Python script executed on the remote VPS directly interpolates the `[Token]` placeholder into a string that is then executed, allowing for arbitrary Python code injection if a malicious token is provided. Additionally, the skill uses `sshpass` with plaintext passwords and disables `StrictHostKeyChecking`, exposing credentials and enabling potential Man-in-the-Middle attacks. Various other placeholders (`[agent名]`, `[Discord_ID]`, `[agentId]`) are directly inserted into shell commands without apparent sanitization, creating further shell injection vulnerabilities on both local and remote systems.