Trust Assessment
whoop received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 5 findings: 2 critical, 3 high, 0 medium, and 0 low severity. Key findings include File read + network send exfiltration, Sensitive path access: AI agent config, Unencrypted storage of OAuth tokens on disk.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | File read + network send exfiltration AI agent config/credential file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/borahm/whoop/SKILL.md:19 | |
| CRITICAL | File read + network send exfiltration AI agent config/credential file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/borahm/whoop/SKILL.md:36 | |
| HIGH | Sensitive path access: AI agent config Access to AI agent config path detected: '~/.clawdbot/'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/borahm/whoop/SKILL.md:19 | |
| HIGH | Sensitive path access: AI agent config Access to AI agent config path detected: '~/.clawdbot/'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/borahm/whoop/SKILL.md:36 | |
| HIGH | Unencrypted storage of OAuth tokens on disk The skill stores OAuth access and refresh tokens in an unencrypted JSON file (`tokens.json`) on the local filesystem. Refresh tokens are long-lived credentials that can be used to obtain new access tokens, making their unencrypted storage a significant security risk if the local system is compromised. While stored in a user's cache directory, this does not provide sufficient protection against local attackers or malware, potentially leading to data exfiltration of sensitive credentials. Implement encryption for sensitive data stored on disk, or use a secure credential store (e.g., OS-level keychain, environment variables for the refresh token if it's static, or a dedicated secrets management service) instead of writing directly to an unencrypted file. Ensure file permissions for `tokens.json` are strictly set to user-only (e.g., 0600). | LLM | lib/tokens.js:19 |
Scan History
Embed Code
[](https://skillshield.io/report/96ac8e6c4babd561)
Powered by SkillShield