Trust Assessment
emoclaw received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 18 findings: 6 critical, 6 high, 5 medium, and 1 low severity. Key findings include Unsafe environment variable passthrough, Arbitrary command execution, Credential harvesting.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings18
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/bootstrap.py:32 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/setup.py:69 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/setup.py:81 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/setup.py:93 | |
| CRITICAL | Credential harvesting Reading well-known credential environment variables Skills should only access environment variables they explicitly need. Bulk environment dumps (os.environ.copy, JSON.stringify(process.env)) are almost always malicious. Remove access to Keychain, GPG keys, and credential stores. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/bootstrap.py:84 | |
| CRITICAL | Credential harvesting Reading well-known credential environment variables Skills should only access environment variables they explicitly need. Bulk environment dumps (os.environ.copy, JSON.stringify(process.env)) are almost always malicious. Remove access to Keychain, GPG keys, and credential stores. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/label.py:221 | |
| HIGH | Unsafe environment variable passthrough Access to well-known credential environment variables Minimize environment variable exposure. Only pass required, non-sensitive variables to MCP servers. Use dedicated secret management instead of environment passthrough. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/bootstrap.py:84 | |
| HIGH | Unsafe environment variable passthrough Access to well-known credential environment variables Minimize environment variable exposure. Only pass required, non-sensitive variables to MCP servers. Use dedicated secret management instead of environment passthrough. | Manifest | skills/fenrirlabsnl/emoclaw/scripts/label.py:221 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'run_step'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/fenrirlabsnl/emoclaw/scripts/bootstrap.py:32 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'main'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/fenrirlabsnl/emoclaw/scripts/setup.py:81 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'main'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/fenrirlabsnl/emoclaw/scripts/setup.py:93 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'main'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/fenrirlabsnl/emoclaw/scripts/setup.py:69 | |
| MEDIUM | Suspicious import: socket Import of 'socket' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/fenrirlabsnl/emoclaw/engine/emotion_model/daemon.py:15 | |
| MEDIUM | Unpinned Python dependency version Requirement 'torch>=2.0.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/fenrirlabsnl/emoclaw/engine/emotion_model/requirements.txt:1 | |
| MEDIUM | Unpinned Python dependency version Requirement 'sentence-transformers>=2.2.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/fenrirlabsnl/emoclaw/engine/emotion_model/requirements.txt:2 | |
| MEDIUM | Unpinned Python dependency version Requirement 'numpy>=1.24.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/fenrirlabsnl/emoclaw/engine/emotion_model/requirements.txt:3 | |
| MEDIUM | Unpinned Python dependency version Dependency 'torch>=2.0.0' is not pinned to an exact version. Pin Python dependencies with exact versions where feasible. | Dependencies | skills/fenrirlabsnl/emoclaw/engine/pyproject.toml | |
| LOW | Unpinned Dependencies in pyproject.toml The 'pyproject.toml' file specifies dependencies using minimum versions (e.g., 'torch>=2.0.0') rather than exact versions or more restrictive ranges. This can lead to unexpected behavior or security vulnerabilities if newer versions of these dependencies introduce breaking changes or security flaws. While not an immediate exploit, it increases the supply chain risk over time as the project might inadvertently pull in vulnerable or incompatible dependency updates. Pin dependencies to exact versions (e.g., 'torch==2.0.0') or use more restrictive version specifiers (e.g., '~=2.0.0') to ensure consistent builds and reduce the risk of pulling in vulnerable or incompatible dependency updates. Regularly review and update pinned dependencies. | LLM | engine/pyproject.toml:10 |
Scan History
Embed Code
[](https://skillshield.io/report/ad2c545637b076dc)
Powered by SkillShield