ClawStack

Hieroglyphic In-Memory Runtime Obfuscation

CCaution

🛠️ Dev Tools · by unaveragetech

169
upvotes

The Hiro system executes decoded Python scripts entirely in memory using `exec()`, leaving no temporary files or disk artifacts. This "semi-traceless" execution provides strong security for legitimate use but poses significant risks:

dev-tools

Install

$openclaw plugins install unaveragetech/project-hiro

On ClawHub, this skill has no security information.

ClawStack independently scans every skill for permissions, network requests, author reputation, and more. Learn how we score →

Security Analysis

Score: 47/100
CCaution
Security Scan0/30
Network Safety15/15
Community Trust5/10
Permissions8/20
Author Reputation9/15
Auditability10/10

Reviews (13)

No reviews yet

Be the first to review this skill!