Trust Assessment
theme-factory received a trust score of 90/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 2 medium, and 0 low severity. Key findings include Potential Path Traversal in Theme File Access, Undefined Scope of File Modification/Creation.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 16, 2026 (commit ccf6204f). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Potential Path Traversal in Theme File Access The skill describes reading theme files from the `themes/` directory and generating new themes based on user input. If the theme name or generation parameters are not properly sanitized, an attacker could inject path traversal sequences (e.g., `../`) to read or write files outside the intended `themes/` directory. This could lead to data exfiltration or arbitrary file modification. Implement strict input validation and sanitization for all user-provided inputs that influence file paths (e.g., theme names, artifact paths). Ensure that file operations are restricted to an allow-listed directory and prevent path traversal sequences. | LLM | SKILL.md:40 | |
| MEDIUM | Undefined Scope of File Modification/Creation The skill states it can 'Apply the selected theme's colors and fonts to the deck/artifact' and 'generate a new theme'. The description does not specify any limitations on the target location or type of 'artifact' that can be modified, nor where newly generated themes are stored. Without explicit constraints, this could allow the skill to modify or create files in arbitrary locations on the filesystem, potentially leading to data corruption, denial of service, or privilege escalation if sensitive system files are targeted. Clearly define and enforce the scope of file write and modification operations. Restrict modifications to specific, designated directories or file types. Implement access controls to prevent unauthorized file operations. | LLM | SKILL.md:20 |
Scan History
Embed Code
[](https://skillshield.io/report/f8dfdabb41c70fb6)
Powered by SkillShield