Trust Assessment
telegram-pairing-customization received a trust score of 98/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 0 medium, and 1 low severity. Key findings include Skill requires manual modification of system-level files.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| LOW | Skill requires manual modification of system-level files The skill instructs users to manually modify files within the `/usr/lib/node_modules/openclaw/` directory, which typically requires elevated privileges (e.g., `sudo`). If an AI agent were to attempt to implement this skill using file modification tools, it would necessitate and exercise excessive filesystem permissions. This highlights a design where core system files are directly altered rather than using a plugin or configuration mechanism. Consider if the skill's functionality can be achieved through configuration, a plugin system, or a dedicated API that does not require direct modification of core system files. If direct modification is unavoidable, clearly document the security implications and provide secure, audited methods for applying such changes. | LLM | SKILL.md:82 |
Scan History
Embed Code
[](https://skillshield.io/report/1869012162e1c97f)
Powered by SkillShield