A Share Dashboard
PassAudited by VirusTotal on Apr 1, 2026.
Findings (1)
The skill uses 'subprocess.run' in 'app.py' to execute a hardcoded Python script located in a different skill's directory ('/home/c1/.openclaw/workspace/skills/a-share-stock-dossier/scripts/a_share_snapshot.py'). This cross-skill dependency and the use of shell execution for data retrieval are risky patterns. Additionally, the 'fetch_via_script' function is vulnerable to argument injection because user-provided stock codes are passed directly as command-line arguments without sanitization, which could be used to alter the behavior of the underlying script.
