Trust Assessment
openclaw-media-gen received a trust score of 64/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 0 critical, 2 high, 1 medium, and 0 low severity. Key findings include Suspicious import: urllib.request, Potential data exfiltration: file read + network send, Path Traversal Vulnerability in File Output.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential data exfiltration: file read + network send Function '_download_to_file' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/aisapay/aisa-media-gen/scripts/media_gen_client.py:93 | |
| HIGH | Path Traversal Vulnerability in File Output The skill's client script (`scripts/media_gen_client.py`) allows writing files to arbitrary locations on the filesystem due to an unsanitized 'out_path' argument. The '--out' command-line argument, used for both image and video downloads, is directly used in `os.makedirs` and `open()` without proper sanitization (e.g., `os.path.abspath` or checking for directory traversal sequences like '..'). An attacker could provide a path like `../../../../tmp/malicious.mp4` to write files outside the skill's intended directory, potentially overwriting critical system files or placing malicious executables. Sanitize the `out_path` argument to prevent directory traversal. Use `os.path.normpath` and ensure the resulting path is strictly within an allowed base directory (e.g., a dedicated output folder within the skill's sandbox). For example, resolve the path to an absolute path and verify that it starts with the skill's designated data directory. Alternatively, restrict the `--out` argument to only specify a filename, and always write to a predefined, secure output directory. | LLM | scripts/media_gen_client.py:103 | |
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/aisapay/aisa-media-gen/scripts/media_gen_client.py:24 |
Scan History
Embed Code
[](https://skillshield.io/report/8f444accc9237515)
Powered by SkillShield