Trust Assessment
quodd received a trust score of 91/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 1 medium, and 1 low severity. Key findings include Suspicious import: urllib.request, Authentication token cached on disk.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/khaney64/quodd/scripts/quote.py:14 | |
| LOW | Authentication token cached on disk The skill caches a Quodd API authentication token in `~/.openclaw/credentials/quodd-token.json`. While this is a common practice to reduce repeated authentication requests, storing authentication tokens on disk introduces a risk. If the file permissions for this directory or file are not sufficiently restrictive, or if another compromised process or skill gains unauthorized access to this specific path, the cached token could be read and potentially misused for the duration of its validity (up to 20 hours). The token is derived from the primary credentials, not the credentials themselves. Ensure that the `~/.openclaw/credentials` directory and the `quodd-token.json` file are created with strict file permissions (e.g., 0o700 for the directory and 0o600 for the file) to prevent unauthorized reading by other users or processes. While Python's `open()` respects the system's umask, explicit permission setting can add robustness. | LLM | scripts/quote.py:18 |
Scan History
Embed Code
[](https://skillshield.io/report/476967bf0e0af5e3)
Powered by SkillShield