Security Audit
GroqCloud Automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
GroqCloud Automation received a trust score of 86/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Tool allows reading arbitrary local files and making arbitrary HTTP requests.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Tool allows reading arbitrary local files and making arbitrary HTTP requests The `GROQCLOUD_GROQ_CREATE_AUDIO_TRANSLATION` tool's `file_path` parameter is documented to accept 'Local path' and 'HTTP(S) URL' as input. This capability, if not properly constrained by the execution environment, could allow an agent to:
1. Read arbitrary files from the local filesystem (e.g., `/etc/passwd`, sensitive configuration files) and exfiltrate their content via the GroqCloud API (Data Exfiltration).
2. Make arbitrary HTTP requests to internal network resources or external services (Server-Side Request Forgery - SSRF), potentially leading to information disclosure, port scanning, or unauthorized access to internal systems. Restrict the `file_path` parameter to only accept `base64 data URL` to prevent direct file system access and arbitrary network requests. If local file access or URL fetching is strictly necessary, implement a robust allow-list for file paths and URLs, and ensure the tool operates within a tightly sandboxed environment with minimal privileges. | LLM | SKILL.md:63 |
Scan History
Embed Code
[](https://skillshield.io/report/d9c3455c05f56fe1)
Powered by SkillShield