Pywayne Cross Comm

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: cross-comm Version: 0.1.0 The skill is classified as suspicious due to its high-risk capabilities, despite no explicit evidence of malicious intent or prompt injection in the provided documentation. It requires and utilizes Aliyun OSS access keys (OSS_ACCESS_KEY_ID, OSS_ACCESS_KEY_SECRET) from environment variables, enabling arbitrary file and folder uploads and downloads to/from cloud storage. The server component is described as listening on all interfaces (`0.0.0.0`), and client IDs are generated using MAC addresses, which could expose sensitive network information. While these functionalities align with the stated purpose of a 'cross-language communication service with file transfer,' they present a significant attack surface and potential for misuse if the agent or its environment were compromised, making it a high-risk component.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If broad OSS credentials are used, transferred files could be uploaded to or retrieved from a cloud bucket beyond the intended scope.

Why it was flagged

The skill documents Aliyun OSS access credentials for file/image/folder transfer. This is purpose-aligned, but those credentials can grant access to a cloud storage bucket.

Skill content
OSS_ACCESS_KEY_ID=your-access-key
OSS_ACCESS_KEY_SECRET=your-access-secret
Recommendation

Use a dedicated, least-privilege OSS key and bucket for this skill, avoid sharing secrets in chat or logs, and rotate the key if exposed.

What this means

A mistaken or overly broad file/folder path could share more local data than intended.

Why it was flagged

The documented API can upload local files or folders to OSS as part of messaging. This is central to the stated purpose, but local path selection should remain explicit.

Skill content
# File (auto uploads to OSS)
await client.send_message("/path/to/file.txt", CommMsgType.FILE)
...
# Folder (auto uploads to OSS)
await client.send_message("/path/to/folder", CommMsgType.FOLDER)
Recommendation

Only send specific user-approved files or folders, and avoid using broad paths such as home directories or project roots unless that is intended.

What this means

If exposed on an untrusted network, unintended clients may be able to connect or exchange messages depending on the underlying library configuration.

Why it was flagged

The examples show a WebSocket server listening on all interfaces and clients identified by client IDs. Network messaging is the core purpose, but the setup examples do not show authentication or transport restrictions.

Skill content
server = CrossCommService(role='server', ip='0.0.0.0', port=9898)
...
client_id='my_client',    # Optional: auto-generated if omitted
Recommendation

Bind to localhost or a trusted interface when possible, use firewall rules or authentication/TLS if supported, and exchange files only with trusted clients.

What this means

Users must trust the external package that implements the documented behavior.

Why it was flagged

The skill depends on an external Python module while the supplied artifact set contains only documentation and no install specification or package source.

Skill content
from pywayne.cross_comm import CrossCommService, CommMsgType
Recommendation

Install the pywayne package only from a trusted source and review its package metadata or source before using it in sensitive environments.