Security Audit
trello-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
trello-automation received a trust score of 97/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 0 medium, and 1 low severity. Key findings include Unpinned MCP Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| LOW | Unpinned MCP Dependency The skill's manifest declares a dependency on the 'rube' MCP without specifying a version. This can lead to supply chain risks if future versions of 'rube' introduce breaking changes, vulnerabilities, or unexpected behavior. It's best practice to pin dependencies to specific versions or version ranges to ensure stability and security. Pin the 'rube' MCP dependency to a specific version or a compatible version range in the manifest. For example, `"rube": "^1.0.0"` or `"rube": "1.2.3"`. | Static | Manifest:1 |
Scan History
Embed Code
[](https://skillshield.io/report/1ed5dc996c44b231)
Powered by SkillShield