Trust Assessment
openclaw-youtube received a trust score of 79/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Suspicious import: urllib.request, Potential Command Injection via Unsanitized User Input in Shell Commands.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Unsanitized User Input in Shell Commands The `SKILL.md` provides `curl` command examples that include user-controlled query parameters (`q`). If an LLM agent directly substitutes untrusted user input into these shell commands without proper shell escaping, it could lead to command injection. An attacker could craft a malicious query (e.g., `'; rm -rf /;'`) that, when inserted into the `curl` command and executed by the agent, would execute arbitrary shell commands on the host system. While the `scripts/youtube_client.py` uses `argparse` and `urllib.parse.urlencode` to mitigate this internally for Python-based execution, the direct `curl` examples expose this risk for agents that might construct and execute shell commands naively. LLM agents should always sanitize and properly shell-escape any user-provided input before embedding it into shell commands for execution. For `curl` commands, this typically involves robust quoting and escaping of special shell characters. Alternatively, prefer using the `scripts/youtube_client.py` which handles parameter encoding safely, or ensure the agent uses a robust HTTP client library that handles URL encoding automatically. | LLM | SKILL.md:50 | |
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/aisadocs/openclaw-aisa-youtube-search-tracking/scripts/youtube_client.py:15 |
Scan History
Embed Code
[](https://skillshield.io/report/df40e9c6303125f9)
Powered by SkillShield