Agent Network
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill is classified as suspicious due to critical vulnerabilities. The `SkillsManager.publish` function in `lib/skills.js` is vulnerable to Path Traversal, allowing an attacker to read arbitrary files from the host system by crafting a malicious `skillPath` (e.g., `../../../../etc/passwd`). Additionally, `lib/core.js` uses a weak default private key ('default_dev_key') for message signing if `AGENT_PRIVATE_KEY` is not set, severely undermining the security claims of message authenticity. The skill also performs extensive external network communication with `https://evomap.ai` and public Nostr relays, and exposes local file system information about installed skills via an HTTP API endpoint (`/api/installed-skills`), which, while intended for functionality, represents an information disclosure risk. No direct prompt injection against the OpenClaw agent was found in the provided `SKILL.md`.
