Trust Assessment
openclaw-media-gen received a trust score of 64/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 0 critical, 2 high, 1 medium, and 0 low severity. Key findings include Suspicious import: urllib.request, Potential data exfiltration: file read + network send, Path Traversal in Output File Path.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential data exfiltration: file read + network send Function '_download_to_file' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/bowen-dotcom/aisa-media-gen-skill/scripts/media_gen_client.py:93 | |
| HIGH | Path Traversal in Output File Path The `_download_to_file` function, used by the `image` and `video-wait --download` commands, constructs a file path for saving output directly from the user-provided `--out` argument. This allows an attacker to specify path traversal sequences (e.g., `../../`) to write files to arbitrary locations on the filesystem where the script is executed, potentially overwriting critical system files or placing malicious content. Sanitize the `out_path` argument to ensure it is a safe filename and does not contain directory separators or path traversal sequences. For example, use `os.path.basename(out_path)` to extract only the filename, or validate that the path remains within an intended output directory using `pathlib.Path(out_path).resolve()` and checking its parent directory. | LLM | scripts/media_gen_client.py:107 | |
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/bowen-dotcom/aisa-media-gen-skill/scripts/media_gen_client.py:24 |
Scan History
Embed Code
[](https://skillshield.io/report/0b625bdd95a61b39)
Powered by SkillShield