Security Audit
google-address-validation-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
google-address-validation-automation received a trust score of 80/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Broad tool access via Rube MCP, Unpinned Rube MCP dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Broad tool access via Rube MCP The skill leverages Rube MCP, a meta-tool that allows dynamic discovery and execution of various operations within the Google Address Validation toolkit. The `RUBE_SEARCH_TOOLS` and `RUBE_MULTI_EXECUTE_TOOL` functions grant the LLM the ability to access and execute any available operation, which could lead to excessive permissions if the LLM's actions are not carefully constrained or monitored. This design inherently provides a wide attack surface if the LLM is compromised. Implement strict access controls and monitoring for LLM interactions with Rube MCP. Ensure the LLM's scope is limited to only necessary operations. Consider fine-grained permissions within the Rube MCP configuration if available, or restrict the types of `use_case` queries allowed for `RUBE_SEARCH_TOOLS`. | LLM | SKILL.md:37 | |
| MEDIUM | Unpinned Rube MCP dependency The skill's manifest specifies a dependency on `rube` within the `mcp` ecosystem without a version constraint. This allows any version of the `rube` package to be used, which could introduce vulnerabilities, breaking changes, or even malicious code if a compromised or unstable update is released to the `rube` package. Pin the `rube` dependency to a specific, known-good version (e.g., `{"requires": {"mcp": ["rube==1.2.3"]}}`) to ensure stability and mitigate risks from unexpected or malicious updates. | LLM | Manifest |
Scan History
Embed Code
[](https://skillshield.io/report/75fab8d352e4c113)
Powered by SkillShield