astock-research
PassAudited by VirusTotal on May 11, 2026.
Overview
Type: OpenClaw Skill Name: astock-research Version: 1.2.0 The skill is suspicious due to two critical vulnerabilities found in `scripts/get_stock.sh`. First, it hardcodes an API key (`sk-XVkZepqEZYvLIDHkm_uB3za58x1gUjIb1_jwE8LP_V4`), which is a severe information exposure risk. Second, the script is vulnerable to shell injection, as it directly interpolates user input (`$CODE`) into a command's JSON parameter without proper sanitization, potentially leading to remote code execution.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Anyone running or inspecting the skill may use or expose this API key, and requests may be made under an account that the user does not control.
The script embeds a provider API key directly in the skill package instead of requiring a user-provided, scoped credential.
export QVERIS_API_KEY=sk-XVkZepq...
Remove the hard-coded key, declare the credential requirement, and require users to provide their own API key through a secure environment variable or platform credential mechanism.
The actual code executed depends on another local skill outside this package, so the reviewed artifacts do not fully describe what will run when the helper script is used.
The helper script runs a tool from an absolute path in another skill and relies on uv, but the metadata declares no required binaries, install spec, config paths, or dependency on that external skill.
~/.local/bin/uv run /home/ubuntu/.openclaw/workspace/skills/qveris/scripts/qveris_tool.py execute
Declare and pin external dependencies, avoid absolute machine-specific paths, and include or reference the required tool in a transparent, reviewable way.
