Trust Assessment
clawrouter received a trust score of 94/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned dependency in installation instructions.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned dependency in installation instructions The installation command `openclaw plugins install @blockrun/clawrouter` does not specify a version. This means that users will always install the latest version of the package. If a malicious update is pushed to the `@blockrun/clawrouter` package, users could unknowingly install compromised code. It is best practice to pin dependencies to a specific version or at least a major/minor range to ensure stability and security. Pin the dependency to a specific version, e.g., `openclaw plugins install @blockrun/clawrouter@1.0.0` or `openclaw plugins install @blockrun/clawrouter@^1.0.0` to ensure predictable and secure installations. | LLM | SKILL.md:8 |
Scan History
Embed Code
[](https://skillshield.io/report/7d89a475df856ac5)
Powered by SkillShield