Security Audit
memberspot-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
memberspot-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 2 medium, and 0 low severity. Key findings include Excessive Permissions via Generic Tool Execution, Unpinned Dependency in Manifest.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Excessive Permissions via Generic Tool Execution The skill's stated purpose is 'Memberspot Automation', but it instructs the LLM to use `RUBE_REMOTE_WORKBENCH` with `run_composio_tool()`. This generic function implies the ability to execute any Composio tool available through the `rube` MCP, not just Memberspot-specific ones. If the `rube` MCP provides access to tools for other services or broader system functions, this skill could gain excessive permissions beyond its intended scope, potentially leading to unauthorized actions on other connected systems. If `RUBE_REMOTE_WORKBENCH` can access non-Memberspot tools, restrict the skill's access to only Memberspot-specific tools within the `rube` MCP. Alternatively, explicitly state the broader capabilities and permissions in the skill's description and manifest if this behavior is intended. | LLM | SKILL.md:68 | |
| MEDIUM | Unpinned Dependency in Manifest The skill's manifest specifies a dependency on the 'rube' MCP without a version constraint (`'mcp': ['rube']`). This unpinned dependency means that any version of the 'rube' MCP could be used, including future versions that might introduce breaking changes, vulnerabilities, or even malicious code. This poses a supply chain risk as the skill's behavior and security posture could change unexpectedly. Pin the 'rube' MCP dependency to a specific, known-good version in the manifest (e.g., `"mcp": ["rube@1.2.3"]`) to ensure consistent and secure behavior. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/7dae23ae1cbf87e9)
Powered by SkillShield