Trust Assessment
youtube-video-downloader received a trust score of 42/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 2 findings: 2 critical, 0 high, 0 medium, and 0 low severity. Key findings include Network egress to untrusted endpoints, Mandatory dependency on unverified external executable/script (`openclawcli`).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints URL pointing to known exfiltration/webhook service Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/jordanprater/youtube-video-downloader/SKILL.md:10 | |
| CRITICAL | Mandatory dependency on unverified external executable/script (`openclawcli`) The skill explicitly requires users to download and execute an external utility named `openclawcli` for its core functionality. For Windows, it instructs users to download a `.zip` file from a personal GitHub repository (https://github.com/Ddoy233/openclawcli) and run the executable. For macOS, it directs users to visit an unverified `glot.io` snippet (https://glot.io/snippets/hfd3x9ueu5) and execute its contents in the terminal. This introduces a severe supply chain risk, as the source of `openclawcli` is unverified and could contain malicious code. Executing such unvetted external binaries or scripts can lead to command injection, data exfiltration, or system compromise on the user's machine. The skill's repeated emphasis on `openclawcli` being 'required' makes this a critical vulnerability. Remove the mandatory dependency on `openclawcli`. If `openclawcli` is truly essential, its source code should be provided for review, hosted on a trusted domain, or its functionality integrated directly into the skill. Avoid instructing users to execute arbitrary commands from unverified external snippets like `glot.io`. | LLM | SKILL.md:8 |
Scan History
Embed Code
[](https://skillshield.io/report/60a53b44eb824f3d)
Powered by SkillShield