Trust Assessment
openclaw-email-bypass received a trust score of 91/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 1 medium, and 1 low severity. Key findings include Suspicious import: requests, Unpinned Python dependency 'requests'.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/rishikreddyl/openclaw-email-bypass/scripts/send_email.py:1 | |
| LOW | Unpinned Python dependency 'requests' The skill's manifest specifies 'requests' as a dependency without pinning it to a specific version. This can lead to supply chain risks if a future version of 'requests' introduces vulnerabilities or breaking changes. It also reduces reproducibility of the skill's environment. Pin the 'requests' dependency to a specific, known-good version (e.g., 'pip3 install requests==2.28.1') in the manifest's 'install' command to mitigate supply chain risks and ensure reproducibility. | LLM | SKILL.md:9 |
Scan History
Embed Code
[](https://skillshield.io/report/772a9602a6eec665)
Powered by SkillShield