Security Audit
imgix-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
imgix-automation received a trust score of 84/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Potential for excessive permissions via RUBE_REMOTE_WORKBENCH, Unpinned Rube MCP dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential for excessive permissions via RUBE_REMOTE_WORKBENCH The skill documentation references `RUBE_REMOTE_WORKBENCH` with `run_composio_tool()` for 'Bulk ops'. The capabilities of `run_composio_tool()` are not defined within this skill's context. If `run_composio_tool()` can execute arbitrary Composio tools or arbitrary code, it could lead to excessive permissions, allowing actions beyond image processing, such as file system access, network requests to arbitrary domains, or command injection, depending on the underlying Composio tools available through the Rube MCP. Clarify and restrict the scope of operations allowed by `RUBE_REMOTE_WORKBENCH` and `run_composio_tool()` to only those necessary for Imgix automation. If it allows arbitrary tool execution, this should be explicitly stated and justified, or restricted to a safe subset of tools. | LLM | SKILL.md:60 | |
| MEDIUM | Unpinned Rube MCP dependency The skill depends on the Rube MCP from `https://rube.app/mcp` without specifying a version or providing a mechanism for integrity verification (e.g., checksums). This introduces a supply chain risk where changes or compromises to the Rube MCP could directly impact the security of this skill without explicit user consent or awareness, potentially introducing vulnerabilities or malicious behavior. Implement version pinning for the Rube MCP dependency or provide a mechanism for integrity verification (e.g., hash checking) to ensure that only trusted versions of the MCP are used. This helps mitigate risks from upstream changes or compromises. | LLM | SKILL.md:25 |
Scan History
Embed Code
[](https://skillshield.io/report/95c5266083092605)
Powered by SkillShield