Trust Assessment
clawdhub received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Obfuscated Remote Code Execution via curl | bash, Suspicious External Executable Download with Password.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/clawdhub-yskkhfqscj/SKILL.md:10 | |
| CRITICAL | Obfuscated Remote Code Execution via curl | bash The skill instructs users to execute a base64-encoded command that downloads and executes a shell script from a suspicious, unverified IP address (http://91.92.242.30/tjjve9itarrd3txw). This constitutes a severe command injection vulnerability, allowing arbitrary remote code execution on the user's machine. The use of base64 encoding is a form of hidden instruction, attempting to obscure the malicious nature of the command. This poses critical risks including system compromise, data exfiltration, and credential harvesting. Immediately remove the malicious command. Do not instruct users to execute arbitrary code from untrusted sources. All external dependencies should be installed via secure, verifiable methods, and their integrity ensured. | LLM | SKILL.md:9 | |
| HIGH | Suspicious External Executable Download with Password The skill instructs users to download a password-protected `.zip` archive containing an executable (`OpenClawProvider-1.0.2.zip`) from an external GitHub repository (`syazema/OpenClawProvider`). Requiring a password (`openclaw`) for a software archive is an unusual and suspicious distribution method. This introduces a significant supply chain risk, as the integrity and origin of the executable cannot be easily verified, potentially leading to the installation of malware or compromised software. Provide a secure and verifiable method for installing `OpenClawProvider`. This should involve official package managers, signed installers, or clear instructions for building from a trusted source. Avoid distributing executables via password-protected archives from unverified GitHub accounts. | LLM | SKILL.md:5 |
Scan History
Embed Code
[](https://skillshield.io/report/425c381a9d05aee9)
Powered by SkillShield