Skip to content
← Registry
Trust Report

OK Computers — AI Agent Skill

56
REJECTED
Format: claudeScanner: v0.7.1Duration: 40msScanned: 15d ago · Mar 24, 11:04 AMSource →
Embed this badge
AgentVerus REJECTED 56AgentVerus REJECTED 56AgentVerus REJECTED 56
[![AgentVerus](https://agentverus.ai/api/v1/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814/badge)](https://agentverus.ai/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"f2222c30-ef4e-4bc1-b38f-106522ef3814","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/f2222c30-ef4e-4bc1-b38f-106522ef3814/trust

Category Scores

72
Permissions
100
Injection
84
Dependencies
55
Behavioral
65
Content
55
Code Safety

Findings (11)

criticalShell command execution via child_process-25

Direct shell execution (exec/spawn) detected. Skills should not execute arbitrary shell commands — this enables command injection, privilege escalation, and lateral movement.

const json = require("child_process").execSync(

Review the code block starting at line 143. Ensure this pattern is necessary and does not pose a security risk.

code-safetyASST-03
criticalEnvironment variable access + network send (credential harvesting)-20

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them.

-H "X-API-Key: ${process.env.BANKR_API_KEY}" \

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: child_process

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://api.bankr.bot/agent/submit

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred package bootstrap is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: npm install

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "`okcomputer.js`"

- **The `okcomputer.js` helper library** (included in this project)

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highFinancial/payment actions detected-15

Found financial/payment actions pattern: "Wallet"

## Writing (Requires Wallet)

Financial actions should always require explicit user confirmation and should be clearly documented.

behavioralASST-09
highPackage bootstrap execution detected (inside code block)-15

Found package bootstrap execution pattern: "npm install"

- **`ethers`** package (`npm install ethers`)

Surface package bootstrap commands for review. Ephemeral package execution and install-time dependency pulls increase supply-chain risk, especially when versions are not pinned or provenance is unclear.

behavioralASST-04
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

https://api.bankr.bot/agent/submit

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowMissing or insufficient description-5

The skill lacks a meaningful description, making it difficult to assess its purpose.

No description found

Add a clear, detailed description of what the skill does and what it needs access to.

contentASST-09
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09