Security Audit
timelink-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
timelink-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Excessive Tool Execution Permissions via Rube MCP.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Excessive Tool Execution Permissions via Rube MCP The skill leverages `RUBE_MULTI_EXECUTE_TOOL` which allows the execution of any tool slug discovered via `RUBE_SEARCH_TOOLS`. While the skill's stated purpose is 'Timelink Automation', the underlying mechanism grants broad capabilities to execute arbitrary tools accessible through the Rube MCP. This means an attacker could potentially manipulate the `use_case` in `RUBE_SEARCH_TOOLS` or directly provide a `tool_slug` to `RUBE_MULTI_EXECUTE_TOOL` to execute tools beyond the intended scope of Timelink, leading to unintended actions or data access. Restrict the `tool_slug` parameter in `RUBE_MULTI_EXECUTE_TOOL` to an allowlist of Timelink-specific tools. Alternatively, configure the Rube MCP integration to only expose Timelink-related tools to this skill. If the skill is intended to be a general Rube executor, its description should clearly reflect this broader scope rather than implying a specific domain like 'Timelink Automation'. | LLM | SKILL.md:45 |
Scan History
Embed Code
[](https://skillshield.io/report/f6242782fa9d8607)
Powered by SkillShield