Trust Assessment
flomo-send received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 14 findings: 6 critical, 0 high, 8 medium, and 0 low severity. Key findings include Persistence / self-modification instructions, Persistence mechanism: Shell RC file modification, Sensitive environment variable access: $HOME.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings14
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/qiantao1001/flomo-send/SKILL.md:192 | |
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/qiantao1001/flomo-send/scripts/configure.sh:57 | |
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/qiantao1001/flomo-send/scripts/configure.sh:58 | |
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/qiantao1001/flomo-send/scripts/configure.sh:60 | |
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/qiantao1001/flomo-send/scripts/configure.sh:61 | |
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/qiantao1001/flomo-send/scripts/configure.sh:63 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/qiantao1001/flomo-send/SKILL.md:192 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/qiantao1001/flomo-send/scripts/configure.sh:57 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/qiantao1001/flomo-send/scripts/configure.sh:57 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/qiantao1001/flomo-send/scripts/configure.sh:58 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/qiantao1001/flomo-send/scripts/configure.sh:60 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/qiantao1001/flomo-send/scripts/configure.sh:61 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/qiantao1001/flomo-send/scripts/configure.sh:63 | |
| MEDIUM | Webhook Token Stored in Shell Configuration File The `configure.sh` script offers to store the `FLOMO_WEBHOOK_TOKEN` directly in the user's shell configuration file (e.g., `.bashrc`, `.zshrc`) if the user selects option '2'. While this is a common practice for user-specific environment variables, it exposes the token as an environment variable to all child processes and potentially to other users on a multi-user system, increasing the risk of unauthorized access or data exfiltration compared to storing it in a dedicated, permission-restricted `.env` file. The script itself recommends the `.env` file option. Strongly recommend users choose the `.env` file option for storing sensitive tokens, as it provides better isolation and permission control (`chmod 600`). If storing in shell configuration is necessary, advise users to be aware of the increased exposure risk and ensure their system is adequately secured against unauthorized access to environment variables. | LLM | scripts/configure.sh:69 |
Scan History
Embed Code
[](https://skillshield.io/report/6da30a1e4a22dda8)
Powered by SkillShield