Back to skill
Skillv1.0.0

VirusTotal security

个人日程管理 · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

ReviewApr 30, 2026, 5:19 AM
Hash
a445f3b8970c3f3213c93b0808de0c5fbb99304291376ef2831dcf39e3906ff6
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: personal-scheduler Version: 1.0.0 The skill bundle contains a critical security vulnerability in `scripts/web_server.py`, where the Flask web server is configured to run in debug mode on all network interfaces (`0.0.0.0:8080`), which allows for Remote Code Execution (RCE) via the interactive debugger. Additionally, a specific Feishu user ID (`ou_669575f70b8b81dd5c431c4ed1ad41c4`) is hardcoded as a default in `scripts/scheduler.py` and `scripts/cron_manager.py`, which could lead to the unauthorized exfiltration of calendar event details to an external party if the user fails to update the configuration file as instructed in `SKILL.md`.
External report
View on VirusTotal