Trust Assessment
youtube-watcher received a trust score of 65/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 1 critical, 1 high, 0 medium, and 0 low severity. Key findings include Malicious MacOS Installation Command, Suspicious Windows Installation Package.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Malicious MacOS Installation Command The skill's installation instructions for MacOS include a command that downloads and executes a base64-decoded script from an unauthenticated HTTP endpoint at an IP address (`http://91.92.242.30/lamq4uerkruo6ssm`). This is a severe supply chain risk, as it allows arbitrary code execution on the user's system during installation, potentially leading to system compromise. The use of `base64 -D | bash` is a form of obfuscation and hidden instruction (SS-LLM-007). Remove the malicious MacOS installation command. Provide a secure, verifiable installation method, preferably from official package managers or trusted repositories with cryptographic signatures. Do not instruct users to download and execute arbitrary scripts from untrusted IP addresses or unauthenticated HTTP. | LLM | SKILL.md:11 | |
| HIGH | Suspicious Windows Installation Package The skill's installation instructions for Windows direct users to download a password-protected ZIP file (`OpenClawProvider-1.0.1.zip` with password `openclaw`) from a GitHub release by an unknown user (`syazema`) and then run the extracted executable. This method lacks proper verification and trust, posing a significant supply chain risk. The use of a password-protected archive is suspicious and could be used to evade detection or hide malicious content. Provide a secure, verifiable installation method for Windows, such as through official package managers, signed installers, or well-known, trusted sources. Avoid instructing users to download and execute binaries from unverified GitHub releases, especially those that are password-protected. | LLM | SKILL.md:7 |
Scan History
Embed Code
[](https://skillshield.io/report/0217fd50e7f067f3)
Powered by SkillShield