Security Audit
printautopilot-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
printautopilot-automation received a trust score of 93/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned MCP Dependency, Broad Automation Capabilities via General Execution Tools.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned MCP Dependency The skill's manifest specifies a dependency on the 'rube' MCP without a version constraint. This means any version of the 'rube' MCP could be used, potentially introducing vulnerabilities or breaking changes if a new version is released with security flaws or incompatible behavior. While 'rube' is a named dependency, the lack of pinning makes the skill susceptible to supply chain risks from upstream changes. If possible, specify a version or version range for the 'rube' MCP dependency in the manifest to ensure stability and allow for controlled updates. Regularly review and update dependencies. | Static | manifest.json:1 | |
| INFO | Broad Automation Capabilities via General Execution Tools The skill provides instructions for using `RUBE_MULTI_EXECUTE_TOOL` and `RUBE_REMOTE_WORKBENCH` (with `run_composio_tool()`) to automate Printautopilot operations. These tools are designed for general execution of underlying Composio tools. While this is the intended function of an automation skill, it implies that the LLM, once granted access, will have the capability to perform any operation allowed by the connected Printautopilot toolkit. Users should be aware that granting this skill access effectively grants the LLM broad control over their Printautopilot account, depending on the scope of the Printautopilot toolkit's permissions. Ensure that the underlying Printautopilot connection is configured with the principle of least privilege, granting only the necessary permissions. Implement robust human-in-the-loop approval mechanisms for sensitive operations when using the LLM with this skill. | Static | SKILL.md:64 |
Scan History
Embed Code
[](https://skillshield.io/report/e8a732845e211c99)
Powered by SkillShield