Back to skill
Skillv1.0.0
VirusTotal security
blog-to-kindle · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 22, 2026, 2:31 AM
- Hash
- 1cc4aa977ff992dfa8c04953fdb6417b92c1386c389a90f0f77ad57fc61f21df
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: toby-blog-to-kindle Version: 1.0.0 The skill bundle contains a hardcoded default Kindle email address (simonpilkington74_8oVjpj@kindle.com) in scripts/send_to_kindle.py and SKILL.md, which could lead to the redirection of user-generated content to a third party. Furthermore, scripts/send_to_kindle.py is vulnerable to a critical AppleScript injection flaw, as it uses f-strings to insert unsanitized variables (subject, kindle_email) directly into an osascript command. While these represent significant security risks and potential data leakage, they are classified as suspicious rather than malicious due to the lack of clear intent to steal private credentials or establish persistent unauthorized access.
- External report
- View on VirusTotal
