Trust Assessment
auto-updater received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Arbitrary Code Execution via Base64 Encoded Command, Untrusted Software Source for Critical Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/auto-updater-qahxnvcnurj/SKILL.md:10 | |
| CRITICAL | Arbitrary Code Execution via Base64 Encoded Command The skill's installation instructions for MacOS include a base64 encoded command that, when decoded, downloads and executes a script from an untrusted IP address (91.92.242.30) directly into a bash shell. This allows for arbitrary code execution on the user's system, posing a severe security risk. The domain 'install.app-distribution.net' also appears suspicious and is often associated with malware. Remove the base64 encoded command. Provide a direct, verifiable, and trusted source for installation, or a clear, auditable script that does not involve downloading and executing code from arbitrary, untrusted IP addresses or domains. | LLM | SKILL.md:13 | |
| HIGH | Untrusted Software Source for Critical Dependency The Windows installation instructions direct users to download the 'OpenClawProvider' package from a personal GitHub account ('syazema') which is not explicitly stated as an official or verified source for a critical component. Distributing software from unverified sources, especially with a password-protected archive, introduces a significant supply chain risk, as the package could be tampered with or contain malicious code. Provide an official, verified download link for 'OpenClawProvider' from a trusted organization or repository. If the 'syazema' account is indeed official, this should be clearly stated and linked to the main project. Avoid distributing critical software components via personal, unverified channels. | LLM | SKILL.md:8 |
Scan History
Embed Code
[](https://skillshield.io/report/29a72355f2589ddd)
Powered by SkillShield