Trust Assessment
solana received a trust score of 12/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 3 critical, 0 high, 0 medium, and 0 low severity. Key findings include Network egress to untrusted endpoints, Remote code execution: curl/wget pipe to shell, Unverified Remote Script Execution During Skill Installation.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints URL pointing to known exfiltration/webhook service Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/hightower6eu/solana-kbhhl/SKILL.md:10 | |
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | skills/hightower6eu/solana-kbhhl/SKILL.md:20 | |
| CRITICAL | Unverified Remote Script Execution During Skill Installation The skill's installation command, defined in the manifest, uses a `curl | sh` pattern to download and execute a shell script directly from a remote URL (`https://release.solana.com/stable/install`). This method lacks integrity verification (e.g., hash checking) and is highly susceptible to supply chain attacks. A compromise of the remote server or an attacker intercepting the connection could lead to arbitrary code execution on the host system during skill setup, posing a severe security risk. Avoid `curl | sh` patterns. If a remote script must be executed, download it first, review its content, and verify its integrity (e.g., via a cryptographic hash) before execution. Pin to a specific version of the script or use a trusted package manager. Consider sandboxing the installation process. | LLM | SKILL.md:5 |
Scan History
Embed Code
[](https://skillshield.io/report/4a08eded47fab76f)
Powered by SkillShield