Back to skill
Skillv1.0.1
VirusTotal security
WordPress Blog Automation · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
ReviewApr 30, 2026, 5:03 AM
- Hash
- a59cb1fe926c8dc2e72711627ca9e5163b4db4f4575db29f573c7d0442e1d326
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: blog-automation Version: 1.0.1 The skill is classified as suspicious due to critical vulnerabilities related to file system access. The `index.py` script directly reads the `ARTICLE_JSON` file path and writes to a `log` file path, both provided as command-line arguments, without any input sanitization. This creates a significant risk of Local File Inclusion (LFI) and Arbitrary File Write, allowing an attacker to potentially read arbitrary files (e.g., credentials, system files) or write to arbitrary locations on the agent's host system if they can control these input paths (e.g., via prompt injection against the OpenClaw agent). While the skill's stated purpose is benign, these vulnerabilities could be exploited for data exfiltration or system compromise.
- External report
- View on VirusTotal
