Back to skill
Skillv1.0.0

VirusTotal security

SearXNG Docker · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

ReviewApr 27, 2026, 4:27 AM
Hash
6c5354e59d229502dfec0dec882b44049e208a5644fb310cf84a8545e52b481b
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: searxng-docker Version: 1.0.0 The `scripts/searxng_search.py` script allows specifying an arbitrary `--base-url` for the SearXNG instance without validation. This creates a Server-Side Request Forgery (SSRF) vulnerability if an AI agent can be prompted to execute the script with a malicious or internal URL, potentially allowing it to access internal network resources or other services on the host machine. While the skill's stated purpose is to use a local instance, the lack of validation for this argument makes it a significant security flaw. No other clear indicators of intentional malice (e.g., data exfiltration, persistence, obfuscation, or direct prompt injection for harmful actions) were found.
External report
View on VirusTotal