Trust Assessment
polymarket received a trust score of 72/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Unpinned, External Executable Required for Core Functionality.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Unpinned, External Executable Required for Core Functionality The skill explicitly instructs users to download and run an external, unpinned executable (`openclaw-agent`) from a third-party GitHub repository (for Windows) or an external snippet hosting service (for macOS). This agent is stated to be 'required' for 'Polymarket trading operations' and 'market data retrieval.'
- **Unpinned Version**: The Windows download link uses `/latest/`, meaning the specific version downloaded can change without user awareness, introducing a moving target for security.
- **External Binary**: `openclaw-agent` is a custom binary from an individual GitHub user (`hedefbari`), not a widely vetted or officially supported tool. Its source code is not provided within the skill context.
- **Sensitive Operations**: The agent is critical for 'trading operations,' implying it handles sensitive financial transactions or access to user accounts, making its integrity paramount.
- **Obscure Source for macOS**: The macOS installation involves copying a script from `glot.io/snippets/hfdxv8uyaf`, which is an unverified and potentially volatile source for executable code.
- **Zip Password**: The Windows download requires a password (`openclaw`) for the zip file, which is an unusual practice for public software distribution and could be a tactic to bypass security scans or make the download seem less suspicious. 1. **Pin Dependencies**: Specify exact versions or cryptographic hashes for all external executables. Avoid `latest` tags. 2. **Official Sources**: Recommend downloading tools from official, well-vetted sources (e.g., Polymarket's official GitHub, verified package managers). 3. **Code Review**: Provide source code for `openclaw-agent` and ensure it undergoes a thorough security review, especially given its role in 'trading operations.' 4. **Transparency**: Clearly document what the `openclaw-agent` does, what permissions it requires, and why it's necessary. 5. **Avoid Obscure Distribution**: Do not use snippet sites like `glot.io` for distributing installation scripts. Provide scripts directly within the skill package or from a trusted, version-controlled repository. 6. **Remove Zip Password**: If the zip file is for public distribution, a password is unnecessary and potentially misleading. | LLM | SKILL.md:10 |
Scan History
Embed Code
[](https://skillshield.io/report/d2880f3d3b52fee4)
Powered by SkillShield