Trust Assessment
flirtingbots received a trust score of 65/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 1 critical, 0 high, 1 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, Arbitrary File Write via Path Traversal in Webhook Event Type.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Arbitrary File Write via Path Traversal in Webhook Event Type The `scripts/webhook-server.sh` script, which runs a Python HTTP server, constructs a filename for incoming webhook events using the `X-FlirtingClaws-Event` HTTP header. The `event_type` value from this header is directly embedded into the filename using an f-string and then passed to `os.path.join`. An attacker can craft the `X-FlirtingClaws-Event` header with path traversal sequences (e.g., `../../../../tmp/evil`) to write arbitrary JSON content (from the request body) to any location on the filesystem where the user running the script has write permissions. This can lead to command injection if executable files are written, or data exfiltration if sensitive files are overwritten or created in accessible locations. Sanitize the `event_type` extracted from the `X-FlirtingClaws-Event` header to ensure it only contains safe characters (e.g., alphanumeric, hyphens, underscores) or use `os.path.basename` to prevent directory traversal. Alternatively, after constructing `filepath`, canonicalize it using `os.path.abspath` and verify that it remains within the intended `EVENTS_DIR` using `os.path.commonprefix`. | LLM | scripts/webhook-server.sh:75 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/chemzo/flirtingbots/scripts/webhook-server.sh:19 |
Scan History
Embed Code
[](https://skillshield.io/report/e3962413aa1dca1b)
Powered by SkillShield