Security Audit
chatbotkit-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
chatbotkit-automation received a trust score of 80/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Broad Tool Execution Capabilities via Rube MCP, Unpinned Rube MCP Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Broad Tool Execution Capabilities via Rube MCP The skill instructs the LLM to use `RUBE_MULTI_EXECUTE_TOOL` and `RUBE_REMOTE_WORKBENCH` which allow for the execution of arbitrary tools discovered through `RUBE_SEARCH_TOOLS` or available via Composio. This grants the LLM very broad and potentially unconstrained execution capabilities within the Composio ecosystem, depending on the connected toolkits. An attacker could potentially craft prompts to execute unintended or malicious operations if the underlying Composio tools have sensitive functionalities. Implement stricter access controls or allow-lists for specific tool slugs that the LLM is permitted to execute via Rube MCP. Ensure that the Rube MCP and underlying Composio tools are properly sandboxed and that their capabilities are strictly limited to the intended scope of the skill. Avoid using `RUBE_REMOTE_WORKBENCH` for general execution if not absolutely necessary. | LLM | SKILL.md:55 | |
| MEDIUM | Unpinned Rube MCP Dependency The skill's manifest specifies a dependency on 'rube' MCP without a version constraint (`"mcp": ["rube"]`). This means that any version of the 'rube' MCP could be used, including future versions that might introduce breaking changes, vulnerabilities, or malicious behavior. This exposes the skill to supply chain risks. Pin the 'rube' MCP dependency to a specific, known-good version (e.g., `"mcp": ["rube@1.2.3"]`) to ensure consistent behavior and mitigate risks from unexpected updates. Regularly review and update the pinned version. | LLM | Manifest (frontmatter JSON):3 |
Scan History
Embed Code
[](https://skillshield.io/report/e6c8da48ae96b125)
Powered by SkillShield