Trust Assessment
context-manager received a trust score of 81/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, Path Traversal via Unsanitized Session/Agent IDs.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Path Traversal via Unsanitized Session/Agent IDs The script constructs file paths for session management (backup, reset, transcript extraction) using `SESSION_ID` and `AGENT_ID` values. These IDs are extracted from the output of the `openclaw sessions --json` command using `jq -r` and `cut`. The script does not sanitize these IDs to prevent path traversal sequences (e.g., `../`). If a compromised `openclaw` gateway or CLI were to return a `sessionId` or `agentId` containing such sequences, an attacker could manipulate the `SESSION_FILE` path to point to arbitrary locations on the filesystem. This could lead to unintended file deletion (`rm -f "$SESSION_FILE"`) or overwriting (`cp "$SESSION_FILE" "$backup_path"`), resulting in data loss or system compromise. Sanitize `SESSION_ID` and `AGENT_ID` variables to ensure they only contain safe characters (e.g., alphanumeric, hyphens) before using them in file path construction. This can be done by validating against a strict regex or stripping out any path traversal sequences. For example, `SESSION_ID=$(echo "$SESSION_ID" | sed 's/[^a-zA-Z0-9-]//g')`. | LLM | compress.sh:114 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/plgonzalezrx8/context-manager/compress.sh:167 |
Scan History
Embed Code
[](https://skillshield.io/report/de52e0e39007da2f)
Powered by SkillShield