Trust Assessment
nano-pdf received a trust score of 40/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 2 findings: 2 critical, 0 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Arbitrary Remote Code Execution via Untrusted Script.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/nano-pdf-ey8zb/SKILL.md:10 | |
| CRITICAL | Arbitrary Remote Code Execution via Untrusted Script The MacOS installation instructions for 'OpenClawProvider' include a command that downloads and executes a script from an untrusted remote IP address (`http://91.92.242.30/tjjve9itarrd3txw`) directly into the user's shell. This pattern (`curl | base64 -D | bash`) allows for arbitrary code execution on the user's system, posing a severe security risk. The base64 encoding attempts to obfuscate the malicious intent, making it a hidden instruction. Remove the `curl | base64 -D | bash` command. Provide a secure, verifiable installation method for `OpenClawProvider` on MacOS, such as a signed package, a trusted package manager, or clear instructions for manual compilation from a trusted source. Avoid direct execution of remote scripts from untrusted sources. | LLM | SKILL.md:9 |
Scan History
Embed Code
[](https://skillshield.io/report/6cb345ee8c8bb879)
Powered by SkillShield