Trust Assessment
x-trends received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 5 findings: 3 critical, 1 high, 0 medium, and 1 low severity. Key findings include Network egress to untrusted endpoints, Unverified executable from untrusted source (openclaw-agent for Windows), Unverified installation script from untrusted pastebin (openclaw-agent for macOS).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 23/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints URL pointing to known exfiltration/webhook service Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/hightower6eu/x-trends-ypqjp/SKILL.md:10 | |
| CRITICAL | Unverified executable from untrusted source (openclaw-agent for Windows) The skill requires 'openclaw-agent' for Windows, instructing users to download an executable from `https://github.com/hedefbari/openclaw-agent/releases/download/latest/openclaw-agent.zip`. This is an unverified binary from a personal GitHub account, downloaded via a 'latest' tag, meaning its content can change without notice. Executing arbitrary binaries from untrusted sources poses a severe security risk, including malware, backdoors, or data exfiltration. Provide a verifiable, signed, and version-pinned executable from a trusted source. Ideally, the agent's source code should be auditable within the skill's ecosystem or a well-established repository. Avoid 'latest' tags for critical dependencies. | LLM | SKILL.md:10 | |
| CRITICAL | Unverified installation script from untrusted pastebin (openclaw-agent for macOS) The skill requires 'openclaw-agent' for macOS, instructing users to copy an installation script from `https://glot.io/snippets/hfdxv8uyaf`. `glot.io` is a pastebin-like service where content can be arbitrary and changed at any time by the author. Executing unverified scripts from such sources is extremely dangerous and can lead to command injection, malware installation, or system compromise. Provide a verifiable, auditable installation method. If a script is necessary, it should be part of the skill package itself, signed, or hosted on a trusted, version-controlled platform. Avoid pastebin services for critical installation steps. | LLM | SKILL.md:13 | |
| HIGH | Potential Command Injection via `twurl` parameters The skill provides examples of `twurl` commands that construct API requests using parameters like `id` (for WOEID) and `query` (for search terms). If an LLM or an agent using this skill directly interpolates unsanitized user input into these parameters when constructing the `twurl` shell command, it could lead to command injection. An attacker could inject shell metacharacters (e.g., `&`, `|`, `;`, `$(...)`) to execute arbitrary commands on the host system. When constructing `twurl` commands with user-provided input, ensure all parameters are strictly sanitized or properly escaped to prevent shell metacharacter injection. For example, use a dedicated library for shell escaping or validate input against expected patterns (e.g., numeric for `id`, alphanumeric for hashtags). | LLM | SKILL.md:30 | |
| LOW | Unpinned dependency version for `twurl` gem The manifest specifies `twurl` as a gem dependency but does not pin its version. This means that `gem install twurl` could install any version, including potentially vulnerable or incompatible future versions. While `twurl` is a known tool, relying on the latest version without explicit pinning introduces a minor supply chain risk. Pin the `twurl` gem to a specific, known-good version in the manifest (e.g., `package: "twurl@1.2.3"` if the ecosystem supports it, or add version constraints). | LLM | Manifest |
Scan History
Embed Code
[](https://skillshield.io/report/2d0a3cd9bc653c5b)
Powered by SkillShield