Back to skill
Skillv0.1.4

VirusTotal security

Dev Team · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 29, 2026, 4:32 AM
Hash
b58889c99996ee97773f73fddab58b534dd063697109e38eb4c08f7b7ef8983a
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: team-dev Version: 0.1.4 The skill bundle is classified as **suspicious** due to multiple critical vulnerabilities and high-risk capabilities. The core issue is the explicit configuration of AI agents (Codex, Claude, Gemini, Cursor) with flags that grant them extremely broad and dangerous permissions, including arbitrary shell command execution and file system access (e.g., `--dangerously-bypass-approvals-and-sandbox`, `--allowed-tools run_shell_command,write_file,read_file,grep_search` in `config/agents.json`). User-provided prompts are directly passed to these highly privileged agents via `scripts/spawn-agent.sh`, `scripts/request-fixup.sh`, and `scripts/review-agent.sh`, creating direct **prompt injection vulnerabilities leading to Remote Code Execution (RCE)**. Additionally, the `dev-board`'s Node.js API (`scripts/dev-board/apps/api/src/server.js`) allows execution of powerful local scripts via `/api/actions/` endpoints if `ENABLE_LOCAL_ACTIONS=1`, posing another RCE risk. While these capabilities are intended for automated software development, the lack of robust input sanitization for prompts and the direct execution of commands based on potentially untrusted input make this skill highly vulnerable to abuse.
External report
View on VirusTotal