Trust Assessment
otp-challenger received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 10 findings: 2 critical, 1 high, 7 medium, and 0 low severity. Key findings include Hidden network beacons / undisclosed telemetry, Hardcoded GitHub Token detected, Hardcoded AWS Access Key detected.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Static Code Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings10
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Hardcoded GitHub Token detected A hardcoded GitHub Token was found. Secrets should be stored in environment variables or a secret manager. Replace the hardcoded secret with an environment variable reference. | Static | skills/ryancnelson/otp-challenger/tests/openclaw_interceptor.test.sh:68 | |
| CRITICAL | Hardcoded AWS Access Key detected A hardcoded AWS Access Key was found. Secrets should be stored in environment variables or a secret manager. Replace the hardcoded secret with an environment variable reference. | Static | skills/ryancnelson/otp-challenger/tests/openclaw_interceptor.test.sh:65 | |
| HIGH | Hidden network beacons / undisclosed telemetry Command output piped through base64 encoding Remove undisclosed network calls and telemetry. All outbound communication should be documented and necessary for the skill's stated purpose. BCC injection in email tools is almost always malicious. | Manifest | skills/ryancnelson/otp-challenger/verify.sh:116 | |
| MEDIUM | Potential hardcoded secret (high entropy) A high-entropy string (entropy=5.27) was found in a credential-like context. Verify this is not a hardcoded secret. Use environment variables for sensitive values. | Static | skills/ryancnelson/otp-challenger/tests/openclaw_interceptor.test.sh:68 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ryancnelson/otp-challenger/check-status.sh:14 | |
| MEDIUM | Sensitive environment variable access: $USER Access to sensitive environment variable '$USER' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ryancnelson/otp-challenger/check-status.sh:25 | |
| MEDIUM | Sensitive environment variable access: $AWS_REGEX Access to sensitive environment variable '$AWS_REGEX' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ryancnelson/otp-challenger/examples/openclaw/interceptor.sh:14 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ryancnelson/otp-challenger/get-current-code.sh:9 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ryancnelson/otp-challenger/verify.sh:14 | |
| MEDIUM | Sensitive environment variable access: $USER Access to sensitive environment variable '$USER' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ryancnelson/otp-challenger/verify.sh:187 |
Scan History
Embed Code
[](https://skillshield.io/report/1964b73d5837ad75)
Powered by SkillShield