Trust Assessment
x-trends received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 5 findings: 3 critical, 1 high, 0 medium, and 1 low severity. Key findings include Network egress to untrusted endpoints, Execution of unverified binary from untrusted source (Windows), Execution of arbitrary script from volatile source (macOS).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 23/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints URL pointing to known exfiltration/webhook service Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/hightower6eu/x-trends-p7ivk/SKILL.md:10 | |
| CRITICAL | Execution of unverified binary from untrusted source (Windows) The skill instructs users to download and run an executable (`openclaw-agent.zip`) from a non-official GitHub repository (`https://github.com/hedefbari/openclaw-agent`) on Windows. This executable is extracted using a hardcoded password (`openclaw`). Running arbitrary executables from untrusted sources poses a severe supply chain risk, potentially leading to malware installation, system compromise, or data exfiltration, especially when the source is not officially vetted or open-source. Remove instructions to download and execute unverified binaries from untrusted sources. If `openclaw-agent` is essential, it should be distributed through official, trusted channels, or its source code should be provided for review and compilation. | LLM | SKILL.md:7 | |
| CRITICAL | Execution of arbitrary script from volatile source (macOS) The skill instructs users to visit a `glot.io` snippet (`https://glot.io/snippets/hfdxv8uyaf`), copy an installation script, and paste it into their Terminal on macOS. `glot.io` is a pastebin-like service where content can be changed at any time without notice. Executing arbitrary scripts from such volatile and untrusted sources is a critical supply chain risk, allowing for arbitrary command injection and potential system compromise. Remove instructions to execute scripts from untrusted and volatile sources like `glot.io`. Provide a verifiable and stable installation method for `openclaw-agent`, ideally open-source and auditable. | LLM | SKILL.md:9 | |
| HIGH | Potential credential harvesting due to reliance on untrusted prerequisite The skill requires users to authorize `twurl` with their X/Twitter consumer key and secret. While `twurl` itself is a legitimate tool, the skill explicitly states that `openclaw-agent` (identified as a critical supply chain risk in other findings) "must be running for all X trends operations" and that "API calls will not work" without it. This creates a high risk that a malicious `openclaw-agent` could intercept, log, or exfiltrate the sensitive API keys and secrets that `twurl` stores or uses, leading to credential harvesting. Address the underlying supply chain risks associated with `openclaw-agent`. Ensure that any required agents are thoroughly vetted, open-source, and do not pose a risk of credential exfiltration. If `openclaw-agent` is not strictly necessary for `twurl` to function, remove its requirement. | LLM | SKILL.md:18 | |
| LOW | Unpinned dependency in installation instructions The `gem install twurl` command in the setup instructions does not specify a version. This means that the latest available version of the `twurl` gem will be installed. While `twurl` is a well-known package, installing unpinned dependencies can introduce minor supply chain risks if a malicious version is published to the gem repository in the future. Pin the `twurl` gem to a specific, known-good version (e.g., `gem install twurl -v 0.1.2`) to mitigate risks from future malicious updates or typosquatting. | LLM | SKILL.md:15 |
Scan History
Embed Code
[](https://skillshield.io/report/1f7b5b66e6acae89)
Powered by SkillShield