Trust Assessment
Lightpanda received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 6 findings: 2 critical, 1 high, 3 medium, and 0 low severity. Key findings include Persistence / self-modification instructions, Network egress to untrusted endpoints, Sensitive environment variable access: $HOME.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings6
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/krichprollsch/lightpanda-browser/install.sh:74 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/krichprollsch/lightpanda-browser/SKILL.md:34 | |
| HIGH | Installation uses nightly builds, increasing supply chain risk The `install.sh` script downloads and executes a 'nightly' build of the Lightpanda browser from GitHub. Nightly builds are inherently less stable, less tested, and carry a higher risk of containing vulnerabilities or malicious code compared to stable, versioned releases. Although checksum verification is performed, it relies on the integrity of the GitHub API and the nightly build process itself. A compromise of the nightly build pipeline could lead to the distribution of malicious binaries. Recommend using stable, versioned releases of the Lightpanda browser instead of nightly builds. If nightly builds are strictly necessary, implement additional integrity checks (e.g., GPG signatures) or restrict usage to isolated environments. | LLM | scripts/install.sh:20 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/krichprollsch/lightpanda-browser/SKILL.md:24 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/krichprollsch/lightpanda-browser/install.sh:7 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | skills/krichprollsch/lightpanda-browser/install.sh:74 |
Scan History
Embed Code
[](https://skillshield.io/report/d8c9d753cbe9188e)
Powered by SkillShield