Back to skill
Skillv1.3.0

VirusTotal security

Openclaw Send Skill · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 4:16 AM
Hash
8dcb850ccfebc92453fd7eab1883bee4e5e4f44e15434a2359d13b260427d247
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: ceaser-send Version: 1.3.0 The skill is classified as suspicious due to its broad use of Bash for system commands and its reliance on `npx -y` to execute external packages. While the code and instructions appear to use these capabilities for their stated purpose (automated ETH transfers via the Ceaser protocol), the extensive use of `Bash` (`curl`, `jq`, `node`, `mv`, `chmod`) and `npx -y ceaser-mcp` introduces significant vulnerability surfaces. Specifically, `npx -y` can download and execute arbitrary code from npm, posing a supply chain risk if the `ceaser-mcp` package were compromised. Additionally, the direct manipulation of `~/.ceaser-mcp/notes.json` using complex `jq` commands, although carefully implemented, demonstrates powerful file system access that could be exploited if inputs were not properly controlled. There is no evidence of intentional malicious behavior like data exfiltration or backdoors, and sensitive data (mnemonics, ZK backup strings) are handled with explicit security warnings and passed via environment variables to local scripts (`helpers/wallet-ops.js`), which is a relatively secure practice for secrets.
External report
View on VirusTotal