Trust Assessment
moltbook-firewall received a trust score of 84/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 3 findings: 0 critical, 0 high, 2 medium, and 1 low severity. Key findings include Sensitive environment variable access: $HOME, Inconsistent threat pattern management, Unmanaged external dependency `jq`.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/machinesbefree/moltbook-firewall/scripts/firewall-scan.sh:9 | |
| MEDIUM | Inconsistent threat pattern management The `SKILL.md` documentation states that threat patterns are defined in `patterns/threats.json` and can be updated using `./scripts/add-pattern.sh`. However, the `scripts/firewall-scan.sh` script, which performs the actual scanning, hardcodes all its detection patterns directly within the script. This means that any updates to `patterns/threats.json` or usage of `add-pattern.sh` will not affect the operational behavior of `firewall-scan.sh`. This inconsistency creates a supply chain risk by undermining the advertised mechanism for updating threat definitions, potentially leading to the agent operating with outdated or incomplete protections despite perceived updates. Modify `scripts/firewall-scan.sh` to dynamically load and parse threat patterns from `patterns/threats.json` at runtime. Ensure `add-pattern.sh` correctly updates `threats.json` in a format consumable by `firewall-scan.sh`. | LLM | scripts/firewall-scan.sh:50 | |
| LOW | Unmanaged external dependency `jq` The `firewall-scan.sh` script relies on the external `jq` utility for formatting and logging JSON output. However, there are no explicit checks for `jq`'s presence, nor are there instructions or mechanisms to manage its installation or version. This introduces a supply chain risk: if `jq` is not installed, the script's logging functionality will fail. Furthermore, if a malicious or outdated version of `jq` is present in the system's PATH, it could potentially be exploited, affecting the integrity of the firewall's logging or execution. Add a check at the beginning of `scripts/firewall-scan.sh` to verify the presence of `jq`. If `jq` is not found, the script should exit with an informative error message and instructions for installation. Consider specifying a minimum required version of `jq` if compatibility issues are a concern. | LLM | scripts/firewall-scan.sh:120 |
Scan History
Embed Code
[](https://skillshield.io/report/11559f9136982b1e)
Powered by SkillShield