Security Audit
honeyhive-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
honeyhive-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned dependency in manifest.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned dependency in manifest The skill's manifest specifies a dependency on 'rube' within the 'mcp' ecosystem without a specific version. This can lead to supply chain risks, as updates to the 'rube' MCP could introduce breaking changes or vulnerabilities without explicit review or control. It is recommended to pin dependencies to specific versions or version ranges to ensure stability and security. Pin the 'rube' dependency to a specific version or a narrow version range in the skill's manifest. For example, `"mcp": ["rube==1.2.3"]` or `"mcp": ["rube>=1.2.0,<1.3.0"]`. | LLM | Manifest:1 |
Scan History
Embed Code
[](https://skillshield.io/report/be59251f74d49c81)
Powered by SkillShield