Security Audit
goody-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
goody-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 2 medium, and 0 low severity. Key findings include Broad Tool Execution Capability Exposed, Unpinned Rube MCP Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Broad Tool Execution Capability Exposed The skill exposes `RUBE_MULTI_EXECUTE_TOOL` and `RUBE_REMOTE_WORKBENCH` which allow the LLM to execute arbitrary tools provided by the Rube MCP. This grants the LLM broad capabilities to interact with the Goody toolkit and potentially other services connected via Rube. While these tools are fundamental to the Composio ecosystem, their exposure means the LLM has a wide range of actions it can perform, which could lead to unintended or malicious operations if not properly constrained by the LLM's own safety mechanisms and user authorization. Ensure that the Rube MCP and the underlying Goody toolkit enforce strict authorization and scope controls for all exposed tools. Implement robust LLM guardrails to prevent the agent from misusing these broad execution capabilities. Consider fine-grained access control for specific tool slugs if possible. | LLM | SKILL.md:50 | |
| MEDIUM | Unpinned Rube MCP Dependency The skill's manifest declares a dependency on the `rube` MCP (`"mcp": ["rube"]`) without specifying a version. This means that any future version of `rube` could be used, potentially introducing breaking changes, vulnerabilities, or even malicious code if the `rube` project or its distribution channel were compromised. Pin the `rube` MCP dependency to a specific, known-good version in the `requires` field of the manifest (e.g., `"mcp": ["rube==1.2.3"]`). Regularly review and update pinned dependencies. | LLM | SKILL.md:2 |
Scan History
Embed Code
[](https://skillshield.io/report/a60f6e4d1dd9bd65)
Powered by SkillShield