Security Audit
tavily-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
tavily-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned MCP Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned MCP Dependency The skill's manifest specifies a dependency on the 'rube' MCP without a version constraint. This 'unpinned' dependency can lead to supply chain risks, as a future, potentially malicious or vulnerable, version of 'rube' could be used without explicit approval or review. If the 'rube' MCP endpoint (https://rube.app/mcp) were compromised, or if a malicious version was introduced, the skill would automatically use it. Specify a precise version or version range for the 'rube' MCP dependency in the manifest. For example, `"mcp": ["rube@1.2.3"]` or `"mcp": ["rube@^1.0.0"]` to ensure predictable and secure dependency resolution. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/4d908f05cfc09ab4)
Powered by SkillShield