Castreader Openclaw Skill
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill bundle contains several high-risk security patterns and vulnerabilities. Most notably, it uses an unencrypted HTTP endpoint (http://api.castreader.ai:8123) to transmit web content extracted from sensitive platforms like Notion, Google Docs, and private AI chat interfaces (ChatGPT/Claude), exposing user data to MITM attacks. Additionally, SKILL.md provides instructions that create a shell injection risk by directing the agent to use 'echo' with unsanitized summary text. The 'extractor-bundle.js' is a large, complex payload designed to be injected into various high-privilege web sessions via Puppeteer, which, combined with the lack of transport security, poses a significant risk to data privacy.
