Security Audit
algolia-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
algolia-automation received a trust score of 78/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Broad Tool Access to External Service, Unpinned MCP Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Broad Tool Access to External Service The skill is designed to automate 'Algolia operations' broadly, leveraging `RUBE_MULTI_EXECUTE_TOOL` and dynamic tool discovery (`RUBE_SEARCH_TOOLS`). It does not implement internal restrictions on the types of Algolia operations an agent can perform. If the underlying Algolia connection established via `RUBE_MANAGE_CONNECTIONS` is configured with broad permissions (e.g., full read/write/delete access to Algolia indices), an agent using this skill would be able to exercise those broad permissions, potentially leading to unauthorized data access, modification, or deletion within Algolia. This constitutes an excessive permissions risk for the agent's actions, as the skill provides a mechanism for unconstrained interaction with a powerful external API. Implement granular access control within the skill to restrict the types of Algolia operations an agent can perform, even if the underlying connection has broader permissions. For example, define specific use cases or a whitelist of allowed Algolia actions. Advise users to configure the Algolia connection with the principle of least privilege. | Static | SKILL.md:1 | |
| MEDIUM | Unpinned MCP Dependency The skill's manifest specifies a dependency on the 'rube' MCP (`"requires": {"mcp": ["rube"]}`) without a pinned version. This means the skill could potentially be used with any version of the 'rube' MCP, including future versions that might introduce breaking changes, security vulnerabilities, or unexpected behavior. Relying on unpinned dependencies can lead to instability and security risks in the supply chain. Pin the version of the 'rube' MCP required by the skill to ensure predictable behavior and security. For example, specify a version range or an exact version (e.g., `"mcp": ["rube@^1.0.0"]` or `"mcp": ["rube@1.2.3"]`). | Static | Manifest |
Scan History
Embed Code
[](https://skillshield.io/report/6c15f8baf895aef6)
Powered by SkillShield