Security Audit
telnyx-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
telnyx-automation received a trust score of 83/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Potential Command Injection via RUBE_REMOTE_WORKBENCH, Broad Access to Telnyx Communication Platform.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via RUBE_REMOTE_WORKBENCH The skill exposes `RUBE_REMOTE_WORKBENCH` with `run_composio_tool()` for 'Bulk ops'. The term 'workbench' often implies an environment capable of executing arbitrary code or commands. If `run_composio_tool()` allows execution of unvalidated or user-controlled code/commands, it could lead to command injection, enabling an attacker to execute arbitrary system commands or malicious scripts within the agent's environment. This grants excessive permissions beyond the scope of typical tool execution. Clarify and strictly define the execution capabilities of `RUBE_REMOTE_WORKBENCH` and `run_composio_tool()`. Ensure it operates within a secure, sandboxed environment with minimal privileges. Implement robust input validation and restrict the types of operations that can be performed to prevent arbitrary code or command execution. | LLM | SKILL.md:72 | |
| MEDIUM | Broad Access to Telnyx Communication Platform The skill grants the agent broad access to 'Telnyx operations' via `RUBE_MULTI_EXECUTE_TOOL`. Telnyx is a communication platform, and full access to its API could allow the agent to perform sensitive actions such as sending messages, making calls, accessing call logs, or managing account settings. While intended for automation, this broad permission could be misused by a malicious prompt or an attacker to perform unauthorized communication activities or access sensitive data. Implement granular access control for the Telnyx toolkit. Only expose specific Telnyx tools and operations that are strictly necessary for the skill's intended purpose. Avoid granting blanket access to the entire Telnyx API. | LLM | SKILL.md:50 |
Scan History
Embed Code
[](https://skillshield.io/report/faaf9ff932b73ecf)
Powered by SkillShield