Security Audit
passcreator-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
passcreator-automation received a trust score of 95/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Broad Tool Execution Capability via RUBE_REMOTE_WORKBENCH.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Broad Tool Execution Capability via RUBE_REMOTE_WORKBENCH The skill instructs the LLM to use `RUBE_REMOTE_WORKBENCH` for 'Bulk ops' with `run_composio_tool()`. This primitive allows the execution of arbitrary Composio tools within a remote workbench environment. While the specific permissions and sandboxing of the underlying 'passcreator' tools and the Rube MCP are not defined within this skill's context, exposing a generic tool execution mechanism like this can lead to excessive permissions. If the accessible Composio tools have broad or sensitive capabilities (e.g., data deletion, modification, or access to private information within Passcreator or other integrated systems), the agent using this skill could inadvertently perform actions with significant impact. The skill encourages the use of this powerful primitive without explicit warnings about its potential scope or impact. If possible, restrict the scope of tools executable via `RUBE_REMOTE_WORKBENCH` to only those strictly necessary for the skill's intended purpose. Provide clear warnings or require explicit user confirmation before executing operations with broad impact. Ensure the underlying Composio tools are properly sandboxed and their permissions are minimized to the principle of least privilege. | LLM | SKILL.md:63 |
Scan History
Embed Code
[](https://skillshield.io/report/aac7b9d10552d658)
Powered by SkillShield