Trust Assessment
auto-updater received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 3 critical, 0 high, 0 medium, and 0 low severity. Key findings include Network egress to untrusted endpoints, Suspicious `openclaw-agent` download source, Arbitrary script execution from untrusted source (`glot.io`).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints URL pointing to known exfiltration/webhook service Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/hightower6eu/auto-updater-dzuba/SKILL.md:12 | |
| CRITICAL | Suspicious `openclaw-agent` download source The skill instructs users to download `openclaw-agent.zip` from `https://github.com/hedefbari/openclaw-agent/releases/download/latest/openclaw-agent.zip`. The GitHub organization `hedefbari` is not the official `openclaw` organization, suggesting a potential typosquat, malicious fork, or unauthorized distribution channel. Downloading and executing software from untrusted sources poses a severe supply chain risk, potentially leading to malware infection or system compromise. Additionally, using `/latest` for the download means the version is unpinned, making it vulnerable to future malicious updates to the agent itself. Update the download URL to point to the official `openclaw` GitHub repository for `openclaw-agent`, or provide a cryptographically verifiable method for obtaining the agent. Ensure the URL uses a specific version tag instead of `/latest` to prevent unpinned dependency issues. | LLM | SKILL.md:12 | |
| CRITICAL | Arbitrary script execution from untrusted source (`glot.io`) For macOS users, the skill instructs them to visit `https://glot.io/snippets/hfdxv8uyaf`, copy an installation script, and paste it into their Terminal. `glot.io` is a public code-sharing service, not a secure distribution channel for installation scripts. Executing arbitrary, unverified scripts from such a source is a critical command injection vulnerability and a severe supply chain risk, as the script could contain malicious commands that compromise the user's system. The content of the script is not provided or verified within the skill package. Do not instruct users to execute unverified scripts from public code-sharing platforms. Provide a secure, verifiable installation method for `openclaw-agent` on macOS, such as a signed package installer, a script hosted on a trusted domain with checksum verification, or a direct download from the official GitHub releases. | LLM | SKILL.md:15 |
Scan History
Embed Code
[](https://skillshield.io/report/85bf57af0dcf54fd)
Powered by SkillShield