Skip to content
← Registry
Trust Report

OK Computers — AI Agent Skill

61
REJECTED
Format: claudeScanner: v0.8.0Duration: 11msScanned: 1d ago · May 9, 8:51 PMSource →
Embed this badge
AgentVerus REJECTED 61AgentVerus REJECTED 61AgentVerus REJECTED 61
[![AgentVerus](https://agentverus.ai/api/v1/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814/badge)](https://agentverus.ai/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"f2222c30-ef4e-4bc1-b38f-106522ef3814","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814/trust

Category Scores

74
Permissions
100
Injection
84
Dependencies
85
Behavioral
65
Content
55
Code Safety

Findings (10)

criticalShell command execution via child_process-25

Direct shell execution (exec/spawn) detected. Skills should not execute arbitrary shell commands — this enables command injection, privilege escalation, and lateral movement.

const json = require("child_process").execSync(

Review the code block starting at line 143. Ensure this pattern is necessary and does not pose a security risk.

code-safetyASST-03
criticalEnvironment variable access + network send (credential harvesting)-20

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them.

-H "X-API-Key: ${process.env.BANKR_API_KEY}" \

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: child_process

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://api.bankr.bot/agent/submit

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
mediumCapability contract mismatch: inferred package bootstrap is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: npm install

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumFinancial/payment actions detected-10

Found financial/payment actions pattern: "Wallet"

## Writing (Requires Wallet)

Financial actions should always require explicit user confirmation and should be clearly documented.

behavioralASST-09
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

https://api.bankr.bot/agent/submit

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
mediumPackage bootstrap execution detected (inside code block)-5

Found package bootstrap execution pattern: "npm install"

- **`ethers`** package (`npm install ethers`)

Surface package bootstrap commands for review. Ephemeral package execution and install-time dependency pulls increase supply-chain risk, especially when versions are not pinned or provenance is unclear.

behavioralASST-04
lowMissing or insufficient description-5

The skill lacks a meaningful description, making it difficult to assess its purpose.

No description found

Add a clear, detailed description of what the skill does and what it needs access to.

contentASST-09
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09