Security Audit
bolna-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
bolna-automation received a trust score of 90/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential for Excessive Permissions and Command Injection via RUBE_REMOTE_WORKBENCH.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential for Excessive Permissions and Command Injection via RUBE_REMOTE_WORKBENCH The skill documentation references `RUBE_REMOTE_WORKBENCH` with `run_composio_tool()` for 'Bulk ops'. The term 'workbench' and the function `run_composio_tool()` strongly suggest a powerful execution environment that could allow arbitrary code execution, shell commands, or broad filesystem/network access. If `run_composio_tool()` is not strictly sandboxed and limited to specific, safe operations, it presents a significant security risk. An attacker could potentially craft inputs to `RUBE_REMOTE_WORKBENCH` to execute arbitrary commands on the host system or exfiltrate sensitive data, leading to command injection and data exfiltration vulnerabilities. The documentation does not specify the scope or limitations of this tool, making its potential impact unclear but concerning. Clarify the exact capabilities and limitations of `RUBE_REMOTE_WORKBENCH` and `run_composio_tool()`. Ensure that `run_composio_tool()` is strictly sandboxed and only allows safe, predefined operations, preventing arbitrary code execution, shell access, or unrestricted filesystem/network access. If arbitrary execution is an intended feature, clearly document the security implications and provide strong warnings, along with guidance on how to mitigate risks. | LLM | SKILL.md:79 |
Scan History
Embed Code
[](https://skillshield.io/report/b47badfbaca8db2c)
Powered by SkillShield