Security Audit
files-com-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
files-com-automation received a trust score of 63/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 1 critical, 0 high, 1 medium, and 0 low severity. Key findings include Potential Arbitrary Code Execution via RUBE_REMOTE_WORKBENCH, Unpinned Dependency for Rube MCP.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Static Code Analysis layer scored lowest at 63/100, indicating areas for improvement.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Potential Arbitrary Code Execution via RUBE_REMOTE_WORKBENCH The skill documentation explicitly mentions `RUBE_REMOTE_WORKBENCH` with `run_composio_tool()` for 'Bulk ops'. The term 'workbench' and the function `run_composio_tool()` strongly suggest an environment where arbitrary code or complex scripts can be executed. If this workbench allows unconstrained code execution, it presents a critical command injection and data exfiltration vulnerability, enabling an attacker to run malicious code, access sensitive data, or interact with the underlying system beyond the intended scope of the Files.com toolkit. Clarify the security model and sandboxing of `RUBE_REMOTE_WORKBENCH` and `run_composio_tool()`. If it allows arbitrary code execution, implement strict sandboxing, restrict available functions/modules, and ensure all inputs are validated and sanitized. If not intended for arbitrary code, remove or clarify the documentation to prevent misuse. | Static | SKILL.md:68 | |
| MEDIUM | Unpinned Dependency for Rube MCP The skill's manifest specifies a dependency on `rube` MCP (`"requires": {"mcp": ["rube"]}`) without pinning a specific version. This means that the latest available version of `rube` will always be used. If a future version of `rube` introduces breaking changes, vulnerabilities, or malicious code, the skill could be compromised without explicit action from the developer. This is a common supply chain risk. Pin the version of the `rube` MCP in the `requires` field of the manifest (e.g., `"rube": "^1.2.3"` or `"rube": "1.2.3"`) to ensure consistent and secure behavior. Regularly review and update the pinned version to incorporate security fixes. | Static | manifest.json:1 |
Scan History
Embed Code
[](https://skillshield.io/report/3cb85a4a211da95c)
Powered by SkillShield