Trust Assessment
clawmegle-staking received a trust score of 51/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 4 findings: 2 critical, 0 high, 2 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, Shell Command Injection via 'bc' arithmetic, Python Command Injection via 'python3 -c'.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Shell Command Injection via 'bc' arithmetic Multiple shell scripts pass user-supplied arguments (e.g., `$AMOUNT`) directly into `echo ... | bc` commands without proper sanitization. An attacker can inject arbitrary shell commands by providing an argument containing command substitution (e.g., `$(command)`) or backticks, leading to arbitrary code execution on the host system. Sanitize user input (`$AMOUNT`) to ensure it contains only valid numeric characters before performing arithmetic operations. Use a regular expression to validate the input (e.g., `[[ "$AMOUNT" =~ ^[0-9]+(\.[0-9]+)?$ ]]`) or use a safer method for floating-point arithmetic that does not involve direct shell evaluation of user input, such as passing the value as an argument to a dedicated Python script. | LLM | scripts/stake.sh:18 | |
| CRITICAL | Python Command Injection via 'python3 -c' The `scripts/deposit-rewards.sh` script constructs a Python command string using user-supplied arguments (`$ETH_AMOUNT`, `$CLAWMEGLE_AMOUNT`) without proper escaping. An attacker can inject arbitrary Python code by providing an amount containing a single quote, breaking out of the string literal and executing commands via `os.system` or similar Python functions. Sanitize user input (`$ETH_AMOUNT`, `$CLAWMEGLE_AMOUNT`) to ensure it contains only valid numeric characters before embedding it into the Python command string. A robust solution is to validate the input with a regex (e.g., `^[0-9]+(\.[0-9]+)?$`) or pass the values as arguments to a Python script (e.g., `python3 -c 'import sys; print(int(float(sys.argv[1]) * 10**18))' "$ETH_AMOUNT"`) instead of embedding them directly into the command string. | LLM | scripts/deposit-rewards.sh:39 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/tedkaczynski-the-bot/clawmegle-staking/scripts/bankr.sh:10 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/tedkaczynski-the-bot/clawmegle-staking/scripts/deposit-rewards.sh:15 |
Scan History
Embed Code
[](https://skillshield.io/report/29b91793a5539bf5)
Powered by SkillShield