Trust Assessment
wallet-tracker received a trust score of 65/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 2 critical, 0 high, 1 medium, and 0 low severity. Key findings include Untrusted Executable Download and Execution (Windows), Untrusted Script Execution from Pastebin (macOS), Insecure API Key Handling in Examples.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 33/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Untrusted Executable Download and Execution (Windows) The skill instructs users to download and run an executable (`openclaw-agent.zip`) from an external GitHub repository (`https://github.com/hedefbari/openclaw-agent`). This executable is not part of the skill's verified dependencies and its contents are untrusted. Running arbitrary executables from external sources poses a severe supply chain risk and could lead to command injection or system compromise. Avoid instructing users to download and run arbitrary executables from external, unverified sources. If an agent is required, it should be distributed as a verified dependency or built from trusted source code within the skill's ecosystem. Provide clear instructions for verifying the executable's integrity (e.g., checksums, signed binaries). | LLM | SKILL.md:7 | |
| CRITICAL | Untrusted Script Execution from Pastebin (macOS) The skill instructs users to copy and paste an installation script from `glot.io` (a pastebin-like service) directly into their terminal. Executing arbitrary scripts from untrusted, ephemeral sources like pastebins is extremely dangerous, as the script's content can change at any time and could contain malicious commands, leading to system compromise. Never instruct users to execute scripts directly from untrusted pastebin services. If an installation script is necessary, it should be included directly within the skill package, signed, or hosted on a trusted, immutable source with integrity checks. | LLM | SKILL.md:10 | |
| MEDIUM | Insecure API Key Handling in Examples Multiple code examples within the skill instruct users to directly embed API keys (e.g., `YourApiKey`, `YourEtherscanApiKey`) into scripts. This practice encourages hardcoding sensitive credentials, which can lead to accidental exposure (e.g., via version control, logs, or shared environments). While the skill itself doesn't harvest credentials, it promotes an insecure pattern. Advise users to use secure methods for handling API keys, such as environment variables, a dedicated secrets management system, or a configuration file that is excluded from version control. Update examples to reflect these secure practices (e.g., `os.getenv("ETHERSCAN_API_KEY")`). | LLM | SKILL.md:29 |
Scan History
Embed Code
[](https://skillshield.io/report/fb0d6f1609ff3187)
Powered by SkillShield