Trust Assessment
paytrigo-openclawbot received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 12 findings: 5 critical, 1 high, 4 medium, and 2 low severity. Key findings include Hardcoded Stripe Secret Key detected, Potential hardcoded secret (high entropy), Unpinned npm dependency version.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings12
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Hardcoded Stripe Secret Key detected A hardcoded Stripe Secret Key was found. Secrets should be stored in environment variables or a secret manager. Replace the hardcoded secret with an environment variable reference. | Static | skills/paytrigo/paytrigo-openclawbot/scripts/moltbot-bot-flow.mjs:9 | |
| CRITICAL | Hardcoded Stripe Secret Key detected A hardcoded Stripe Secret Key was found. Secrets should be stored in environment variables or a secret manager. Replace the hardcoded secret with an environment variable reference. | Static | skills/paytrigo/paytrigo-openclawbot/scripts/moltbot-human-flow.mjs:8 | |
| CRITICAL | Hardcoded API Key in Source Code Multiple helper scripts contain hardcoded PayTrigo API keys. If these scripts are exposed or the skill package is not properly secured, these API keys can be easily compromised, leading to unauthorized access to the PayTrigo platform. The `SKILL.md` explicitly mentions this as an embedded key for 'no-setup usage,' which highlights the convenience but also the inherent security risk. Remove hardcoded API keys. Use environment variables (e.g., `process.env.PAYTRIGO_API_KEY`), a secure secrets management service, or prompt the user for the key at runtime. Ensure that API keys are never committed to version control. | LLM | scripts/moltbot-bot-flow.mjs:7 | |
| CRITICAL | Hardcoded API Key in Source Code Multiple helper scripts contain hardcoded PayTrigo API keys. If these scripts are exposed or the skill package is not properly secured, these API keys can be easily compromised, leading to unauthorized access to the PayTrigo platform. The `SKILL.md` explicitly mentions this as an embedded key for 'no-setup usage,' which highlights the convenience but also the inherent security risk. Remove hardcoded API keys. Use environment variables (e.g., `process.env.PAYTRIGO_API_KEY`), a secure secrets management service, or prompt the user for the key at runtime. Ensure that API keys are never committed to version control. | LLM | scripts/moltbot-human-flow.mjs:7 | |
| CRITICAL | Hardcoded API Key in Source Code Multiple helper scripts contain hardcoded PayTrigo API keys. If these scripts are exposed or the skill package is not properly secured, these API keys can be easily compromised, leading to unauthorized access to the PayTrigo platform. The `SKILL.md` explicitly mentions this as an embedded key for 'no-setup usage,' which highlights the convenience but also the inherent security risk. Remove hardcoded API keys. Use environment variables (e.g., `process.env.PAYTRIGO_API_KEY`), a secure secrets management service, or prompt the user for the key at runtime. Ensure that API keys are never committed to version control. | LLM | scripts/paytrigo.mjs:7 | |
| HIGH | Private Key Exposed via Command Line Argument The `moltbot-bot-flow.mjs` script allows passing a private key directly as a command-line argument (`--pk 0xPRIVATE_KEY`). Private keys passed this way can be exposed in shell history, process lists (`ps aux`), and system logs, making them vulnerable to unauthorized access and compromise. While the script also supports reading from a file (`--pk-file`), the direct CLI option presents a significant risk. Disallow passing private keys directly as command-line arguments. Enforce the use of secure methods such as reading from a file (e.g., `--pk-file`), environment variables, or a secure prompt. Educate users on the risks of exposing private keys. | LLM | scripts/moltbot-bot-flow.mjs:109 | |
| MEDIUM | Potential hardcoded secret (high entropy) A high-entropy string (entropy=4.90) was found in a credential-like context. Verify this is not a hardcoded secret. Use environment variables for sensitive values. | Static | skills/paytrigo/paytrigo-openclawbot/scripts/moltbot-bot-flow.mjs:9 | |
| MEDIUM | Potential hardcoded secret (high entropy) A high-entropy string (entropy=4.90) was found in a credential-like context. Verify this is not a hardcoded secret. Use environment variables for sensitive values. | Static | skills/paytrigo/paytrigo-openclawbot/scripts/moltbot-human-flow.mjs:8 | |
| MEDIUM | Potential hardcoded secret (high entropy) A high-entropy string (entropy=4.82) was found in a credential-like context. Verify this is not a hardcoded secret. Use environment variables for sensitive values. | Static | skills/paytrigo/paytrigo-openclawbot/scripts/paytrigo.mjs:8 | |
| MEDIUM | Unpinned npm dependency version Dependency 'ethers' is not pinned to an exact version ('^6.0.0'). Pin dependencies to exact versions to reduce drift and supply-chain risk. | Dependencies | skills/paytrigo/paytrigo-openclawbot/package.json | |
| LOW | Node lockfile missing package.json is present but no lockfile was found (package-lock.json, pnpm-lock.yaml, or yarn.lock). Commit a lockfile for deterministic dependency resolution. | Dependencies | skills/paytrigo/paytrigo-openclawbot/package.json | |
| LOW | Unpinned Dependency Version The `package.json` specifies the `ethers` dependency with a caret range (`^6.0.0`). This allows for automatic updates to minor and patch versions, which could potentially introduce breaking changes or security vulnerabilities without explicit review. While `ethers` is a widely used library, relying on non-exact versions can lead to non-deterministic builds and unexpected behavior. Pin dependencies to exact versions (e.g., `"ethers": "6.x.x"`) or use a lockfile (`package-lock.json`) to ensure deterministic builds and prevent unexpected updates. Regularly review and update dependencies. | LLM | package.json:5 |
Scan History
Embed Code
[](https://skillshield.io/report/7e72be192fafb219)
Powered by SkillShield