Trust Assessment
clawmail received a trust score of 86/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Unpinned npm dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Unpinned npm dependency The skill's manifest specifies an npm package 'clawmail' without a version constraint. This means `npm install -g clawmail` will always fetch the latest version available on the npm registry. If a malicious update is published to the 'clawmail' package, agents installing or updating this skill could be compromised with arbitrary code execution. This constitutes a significant supply chain risk. Pin the npm dependency to a specific, known-good version (e.g., `"npm": "clawmail@1.0.0"`) or use a version range with a lower bound (e.g., `"npm": "clawmail@^1.0.0"`) and consider implementing integrity checks (e.g., `npm shrinkwrap` or `package-lock.json` hashes) to mitigate risks from malicious package updates. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/76024a523933011b)
Powered by SkillShield