Security Audit
Automattic/agent-skills:skills/wp-performance
github.com/Automattic/agent-skillsTrust Assessment
Automattic/agent-skills:skills/wp-performance received a trust score of 35/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 3 findings: 2 critical, 0 high, 1 medium, and 0 low severity. Key findings include Persistence / self-modification instructions, Path Traversal in file existence checks.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on April 1, 2026 (commit 48d4aa21). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/wp-performance/scripts/perf_inspect.mjs:100 | |
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/wp-performance/scripts/perf_inspect.mjs:122 | |
| MEDIUM | Path Traversal in file existence checks The script constructs file paths using the user-provided `--path` argument without sufficient sanitization. This path is then used with `fs.statSync` to check for file existence. An attacker can supply path traversal sequences (e.g., `../../`) in the `--path` argument to check for the existence of arbitrary files or directories outside the intended WordPress installation, leading to information disclosure about the file system structure or presence of sensitive files. Sanitize the `opts.path` argument to ensure it represents a canonical path within the expected WordPress installation directory. This can be done by resolving the path and verifying that it remains within a designated safe base directory, or by strictly validating that it does not contain path traversal sequences like `..`. | LLM | scripts/perf_inspect.mjs:100 |
Scan History
Embed Code
[](https://skillshield.io/report/90618350cc79955a)
Powered by SkillShield