Security Audit
ipdata-co-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
ipdata-co-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned dependency in manifest.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned dependency in manifest The skill manifest specifies a dependency on the 'rube' MCP without a version constraint. This means that any version of 'rube' could be used, including potentially vulnerable or malicious future versions if the 'rube' project were compromised. It's best practice to pin dependencies to specific versions or version ranges to ensure predictable and secure behavior. Pin the 'rube' MCP dependency to a specific version or a narrow version range in the skill manifest. For example, `"mcp": ["rube@1.2.3"]` or `"mcp": ["rube@^1.2.0"]`. | LLM | SKILL.md:4 |
Scan History
Embed Code
[](https://skillshield.io/report/c7b72a1c1dc151da)
Powered by SkillShield