Security Audit
sundial-org/awesome-openclaw-skills:skills/amap
github.com/sundial-org/awesome-openclaw-skillsTrust Assessment
sundial-org/awesome-openclaw-skills:skills/amap received a trust score of 56/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via Unsanitized User Input in Curl Commands.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on March 3, 2026 (commit 6d998e00). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Unsanitized User Input in Curl Commands The skill's `SKILL.md` provides `curl` command examples that directly interpolate user-provided input (e.g., `[城市adcode]`, `[关键词]`, `[地址]`, `[经纬度]`) into shell commands. If the LLM directly substitutes user input into these commands without proper shell escaping, a malicious user could inject shell metacharacters (e.g., `"`, `&`, `|`, `;`, `$()`) to execute arbitrary commands on the host system. For example, providing `foo" && evil_command #` as input for `[关键词]` could terminate the `curl` command and execute `evil_command`. Ensure that all user-provided inputs are strictly validated and properly shell-escaped before being interpolated into any shell command. It is recommended to use a robust shell escaping function or to pass parameters as separate arguments to `curl` (e.g., using `-d` for POST data or constructing the URL carefully with URL encoding for GET parameters) rather than direct string concatenation, especially when dealing with user input. The LLM should be instructed to apply appropriate sanitization/escaping for shell commands. | LLM | SKILL.md:33 |
Scan History
Embed Code
[](https://skillshield.io/report/235b906d2aa6aa57)
Powered by SkillShield