Trust Assessment
whoop-integration received a trust score of 18/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 9 findings: 0 critical, 3 high, 5 medium, and 1 low severity. Key findings include Unsafe deserialization / dynamic eval, Suspicious import: requests, Potential data exfiltration: file read + network send.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Static Code Analysis layer scored lowest at 27/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings9
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential data exfiltration: file read + network send Function 'manual_oauth' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/valeraolexienko/whoop-integration/scripts/manual_oauth.py:74 | |
| HIGH | Potential data exfiltration: file read + network send Function 'start_oauth_flow' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/valeraolexienko/whoop-integration/scripts/oauth_setup.py:129 | |
| HIGH | Potential data exfiltration: file read + network send Function 'rotate_whoop_tokens' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/valeraolexienko/whoop-integration/scripts/token_rotation.py:67 | |
| MEDIUM | Unsafe deserialization / dynamic eval Decryption followed by code execution Remove obfuscated code execution patterns. Legitimate code does not need base64-encoded payloads executed via eval, encrypted-then-executed blobs, or dynamic attribute resolution to call system functions. | Manifest | skills/valeraolexienko/whoop-integration/scripts/test_behavior.py:3 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/valeraolexienko/whoop-integration/scripts/manual_oauth.py:9 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/valeraolexienko/whoop-integration/scripts/oauth_setup.py:13 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/valeraolexienko/whoop-integration/scripts/token_rotation.py:8 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/valeraolexienko/whoop-integration/scripts/whoop_client.py:9 | |
| LOW | Hardcoded Absolute Path for Sensitive File The script 'token_rotation.py' uses a hardcoded absolute path ('/home/valera/.openclaw/whoop_tokens.json') to access the WHOOP tokens file. This is a security risk because it assumes a specific user's home directory. If the script is run by a different user, it could attempt to access or write to an incorrect location. This could lead to unauthorized access to another user's tokens if file permissions are misconfigured, or cause the script to fail for other users due to incorrect file location. Replace the hardcoded path with `os.path.expanduser('~/.openclaw/whoop_tokens.json')` to ensure the script accesses the token file in the current user's home directory, consistent with other scripts in the package. | LLM | scripts/token_rotation.py:10 |
Scan History
Embed Code
[](https://skillshield.io/report/79f4ad7e801cbd72)
Powered by SkillShield