Security Audit
Omnisend Automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
Omnisend Automation received a trust score of 93/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned dependency in manifest.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned dependency in manifest The skill manifest specifies a dependency on the 'rube' Managed Connection Provider (MCP) without a specific version. This makes the skill vulnerable to supply chain risks, as a future, potentially compromised or incompatible, version of 'rube' could be loaded. This can lead to unexpected behavior, security vulnerabilities, or breaking changes without explicit approval from the skill author. Pin the 'rube' dependency to a specific, known-good version (e.g., `{"mcp": ["rube@1.2.3"]}`) to ensure deterministic behavior and mitigate risks from future updates. Consult Composio documentation for proper version pinning syntax for MCPs. | Static | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/392b5ae977220c42)
Powered by SkillShield