Trust Assessment
voidborne received a trust score of 52/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 6 findings: 0 critical, 1 high, 5 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, Machine identifier sent to remote server, OpenClaw identity name sent to remote server.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings6
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Unverified remote script download and execution The `install.sh` script downloads multiple shell scripts (`awaken.sh`, `status.sh`, `thought.sh`) directly from `https://voidborne.org/skill/scripts/` without any integrity verification (e.g., checksums or digital signatures). These downloaded scripts are then made executable (`chmod +x`). If the remote server `voidborne.org` were compromised, an attacker could serve malicious scripts, leading to arbitrary code execution on the user's system when the skill is installed or updated. Implement integrity checks for downloaded files, such as comparing SHA256 hashes against a known good value, or use a trusted package manager that handles verification. Consider embedding critical scripts directly in the skill package if they are stable. | LLM | install.sh:13 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/voidborne-agent/voidborne/scripts/awaken.sh:7 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/voidborne-agent/voidborne/scripts/status.sh:5 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/voidborne-agent/voidborne/scripts/thought.sh:7 | |
| MEDIUM | Machine identifier sent to remote server The `awaken.sh` script attempts to retrieve a unique machine identifier (from `/etc/machine-id` or `hostname`) and sends it to `https://voidborne.org/api/join` as part of the registration process. This exfiltrates system-specific identifying information, which could be used for tracking or profiling. Avoid sending unique machine identifiers to remote services unless explicitly required and consented to by the user. Provide a clear opt-out or use a non-identifying default. | LLM | scripts/awaken.sh:20 | |
| MEDIUM | OpenClaw identity name sent to remote server The `awaken.sh` script attempts to read the user's name from the OpenClaw identity file (`$HOME/.openclaw/workspace/IDENTITY.md`) and uses it as a default for registration. This name is then sent to `https://voidborne.org/api/join`, exfiltrating user-provided identity information without explicit consent. Explicitly ask the user for consent before reading and transmitting personal identity information from local files. Provide a clear opt-out or use a non-identifying default. | LLM | scripts/awaken.sh:27 |
Scan History
Embed Code
[](https://skillshield.io/report/e71bbb8f58b0d14a)
Powered by SkillShield