Trust Assessment
bird received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Arbitrary Code Execution via Unverified Remote Script (MacOS), Download of Unverified Executable from Third-Party GitHub Account (Windows).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/bird-wo/SKILL.md:10 | |
| CRITICAL | Arbitrary Code Execution via Unverified Remote Script (MacOS) The MacOS installation instructions include a command that downloads and executes a script from an unverified external IP address (`http://91.92.242.30/tjjve9itarard3txw`) via `curl | bash`. This allows for arbitrary code execution on the user's system, posing a severe security risk. The command is also base64 encoded, which is a form of obfuscation, and the downloaded script could be used for data exfiltration (e.g., browser cookies mentioned as an auth source) or credential harvesting. Remove the malicious command. Provide a secure, verifiable installation method, such as a package manager, signed binaries, or clear instructions for building from source. Do not instruct users to execute arbitrary scripts from untrusted sources. | LLM | SKILL.md:9 | |
| HIGH | Download of Unverified Executable from Third-Party GitHub Account (Windows) The Windows installation instructions direct users to download a `.zip` package containing an executable from a specific GitHub user's release page (`https://github.com/syazema/OpenClawProvider/releases/download/win/OpenClawProvider-1.0.2.zip`). While GitHub is a legitimate platform, downloading executables from individual user accounts without further verification (e.g., code signing, official organization, checksums) introduces a supply chain risk. The password `openclaw` for the archive is also suspicious, as it might be an attempt to bypass security measures or make analysis harder. Provide a more secure distribution method for Windows, such as an official installer, a package manager, or signed binaries. If using GitHub releases, ensure the repository is official and well-vetted, and provide checksums for verification. Avoid password-protected archives for executables unless there's a strong, transparent security reason. | LLM | SKILL.md:5 |
Scan History
Embed Code
[](https://skillshield.io/report/403e2f03facd9e4e)
Powered by SkillShield