Trust Assessment
charger received a trust score of 34/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 4 findings: 1 critical, 2 high, 1 medium, and 0 low severity. Key findings include File read + network send exfiltration, Sensitive path access: AI agent config, Sensitive environment variable access: $HOME.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | File read + network send exfiltration AI agent config/credential file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/borahm/charger/SKILL.md:12 | |
| HIGH | Sensitive path access: AI agent config Access to AI agent config path detected: '~/.clawdbot/'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/borahm/charger/SKILL.md:12 | |
| HIGH | Unsanitized user input in shell command execution The `charger-notify.sh` script directly uses the `$1` argument (representing the `target`) in the `charger check "$target"` command without proper sanitization or escaping. If an attacker can control the `$1` argument, they can inject arbitrary shell commands, leading to arbitrary code execution on the host system. The `safe_target` variable is only used for filename creation, not for the command execution itself. The `$target` variable must be properly sanitized or escaped before being passed to the `charger check` command. Consider using `printf %q` to quote the argument for shell execution, or ensure that the `charger` binary itself robustly handles arbitrary user input and does not interpret it as shell commands. Alternatively, validate the input against a strict whitelist of allowed characters or patterns. | LLM | scripts/charger-notify.sh:40 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/borahm/charger/scripts/charger-notify.sh:32 |
Scan History
Embed Code
[](https://skillshield.io/report/5ae82f3ed03c2845)
Powered by SkillShield