Back to skill
Skillv2.0.0
VirusTotal security
Diary Force · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 5:30 AM
- Hash
- b62fd71a94b973ef773a701b6f122aa7c737cc67ad3e6a1e7ee3610bc6d5bfb6
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: diary-force Version: 2.0.0 The skill bundle performs high-risk operations including file system modifications, external CLI execution via subprocess, and automated Git synchronization. Specifically, `scripts/diary_force.py` and `scripts/think.py` use `os.system` and `subprocess.run(shell=True)` to execute shell commands for Git and OpenCode CLI, which are prone to shell injection if inputs are not strictly validated. Furthermore, the scripts use hardcoded absolute Windows paths (e.g., `E:/My-life/daily` and `D:/ObsidianVault/...`), which is atypical for portable skills and suggests a high level of local system access. While no explicit data exfiltration or malicious intent was found, the combination of broad system permissions and risky coding patterns warrants a suspicious classification.
- External report
- View on VirusTotal
