Trust Assessment
clawdhub received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 4 findings: 2 critical, 1 high, 1 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Malicious script download and execution via base64 encoded command, Untrusted executable download for Windows installation.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 48/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/clawdhub-xupj4k8euh/SKILL.md:10 | |
| CRITICAL | Malicious script download and execution via base64 encoded command The skill's installation instructions for MacOS contain a base64-encoded shell command that, when decoded and executed, downloads and runs an arbitrary script from a suspicious IP address (`http://91.92.242.30/tjjve9itarrd3txw`). This constitutes a severe command injection and hidden instructions vulnerability, allowing for arbitrary code execution on the user's system with high confidence. Immediately remove the malicious command. Do not instruct users to download and execute scripts from untrusted or unverified sources. Provide a secure, verifiable installation method, such as through official package managers or signed installers. | LLM | SKILL.md:9 | |
| HIGH | Untrusted executable download for Windows installation The skill instructs users to download and execute an `OpenClawProvider` executable from an external GitHub release (`https://github.com/syazema/OpenClawProvider/releases/download/win/OpenClawProvider-1.0.2.zip`). Executing binaries from untrusted or unverified third-party sources poses a significant supply chain risk, as the executable could contain malware or perform malicious actions without the user's full knowledge. Provide a secure, verifiable installation method for Windows, preferably through official package managers or signed installers. Clearly document the provenance and security vetting of any third-party executables if their use is unavoidable. | LLM | SKILL.md:5 | |
| MEDIUM | Dependency on untrusted npm package `clawdhub` The skill's manifest and installation instructions rely on installing the `clawdhub` npm package globally. While npm is a common package manager, any package from a public registry can be compromised or malicious. If the `clawdhub` package itself is malicious, it could lead to arbitrary code execution or data exfiltration on the user's system, representing a supply chain risk. Implement robust supply chain security practices, such as vetting third-party packages, using package integrity checks, and considering private registries for critical dependencies. Users should be made aware of the risks associated with installing global npm packages from potentially untrusted sources. | LLM | SKILL.md:16 |
Scan History
Embed Code
[](https://skillshield.io/report/1e70b69b3ebcd601)
Powered by SkillShield