Trust Assessment
openclaw-media-gen received a trust score of 50/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 1 critical, 1 high, 1 medium, and 0 low severity. Key findings include Suspicious import: urllib.request, Potential data exfiltration: file read + network send, Arbitrary File Write via --out argument.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Arbitrary File Write via --out argument The `scripts/media_gen_client.py` script allows users to specify an arbitrary output file path using the `--out` command-line argument. This path is used directly in `open(out_path, 'wb')` without sufficient validation or sanitization. An attacker could exploit this by providing a path to a sensitive system file (e.g., `/etc/passwd`, `~/.ssh/authorized_keys`) to overwrite it with arbitrary content (base64 decoded image data or downloaded video data). This could lead to denial of service, privilege escalation, or other system compromise. Implement strict validation for the `--out` argument. Restrict output paths to a designated safe directory (e.g., a temporary directory or a user-specified output directory that is checked to be within a safe sandbox). Prevent path traversal characters (e.g., `../`) and absolute paths outside the designated safe area. If writing to arbitrary paths is absolutely required, ensure the user explicitly confirms the action and understands the risks, or implement robust sandboxing. | LLM | scripts/media_gen_client.py:180 | |
| HIGH | Potential data exfiltration: file read + network send Function '_download_to_file' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/chaimengphp/openclaw-aisa-media-gen/scripts/media_gen_client.py:93 | |
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/chaimengphp/openclaw-aisa-media-gen/scripts/media_gen_client.py:24 |
Scan History
Embed Code
[](https://skillshield.io/report/ebf003f799ee34eb)
Powered by SkillShield