Security Audit
graphhopper-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
graphhopper-automation received a trust score of 70/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Reliance on external Rube MCP introduces critical supply chain risk.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Reliance on external Rube MCP introduces critical supply chain risk The skill's entire functionality is dependent on an external, third-party service hosted at `https://rube.app/mcp`. All core operations, including tool discovery, connection management, and tool execution (`RUBE_SEARCH_TOOLS`, `RUBE_MANAGE_CONNECTIONS`, `RUBE_MULTI_EXECUTE_TOOL`, etc.), are routed through this Rube MCP. A compromise of the `rube.app` domain or the Rube MCP service could lead to unauthorized data access, data exfiltration, command injection on integrated systems, credential harvesting (e.g., for Graphhopper), or the execution of malicious operations, effectively compromising any system interacting with this skill. The skill explicitly instructs the user to add this external endpoint. 1. Thoroughly vet the security practices and trustworthiness of `rube.app` and Composio. 2. If possible, consider self-hosting the Rube MCP or using a trusted, audited version to reduce reliance on external infrastructure. 3. Implement strict input validation and output sanitization for all interactions with Rube MCP. 4. Limit the permissions granted to the Rube MCP integration to the absolute minimum required. 5. Monitor network traffic and logs for suspicious activity related to Rube MCP interactions. | Static | SKILL.md:20 |
Scan History
Embed Code
[](https://skillshield.io/report/2c69c3462cb4accd)
Powered by SkillShield