Security Audit
pexels-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
pexels-automation received a trust score of 93/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned Dependency in Manifest.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned Dependency in Manifest The skill's manifest declares a dependency on the 'rube' Managed Control Plane (MCP) without specifying a version. This 'unpinned' dependency means the skill could interact with any version of the 'rube' MCP, including future versions that might introduce breaking changes, vulnerabilities, or unexpected behavior. This lack of version pinning can lead to instability and potential security risks if the upstream MCP changes in an undesirable way. Pin the 'rube' MCP dependency to a specific, known-good version or version range in the manifest. For example, `"mcp": ["rube@1.2.3"]` or `"mcp": ["rube@^1.0.0"]` if the MCP system supports versioning. | Static | manifest.json:4 |
Scan History
Embed Code
[](https://skillshield.io/report/fef177712efca788)
Powered by SkillShield