Security Audit
zoho_invoice-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
zoho_invoice-automation received a trust score of 94/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned MCP Dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 17, 2026 (commit 99e2a295). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned MCP Dependency The skill's manifest specifies a dependency on the 'rube' Multi-Capability Provider (MCP) without a version constraint. This allows any version of 'rube' to be used, which could lead to unexpected behavior due to breaking changes or, in a supply chain attack scenario, the introduction of malicious code if a compromised version of 'rube' were published to the ecosystem. Pin the 'rube' MCP dependency to a specific, known-good version or a version range in the `requires` section of the manifest. For example, `"mcp": ["rube@1.2.3"]` or `"mcp": ["rube>=1.2.3,<2.0.0"]` to ensure consistent and secure behavior. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/51ba035911dc6f1f)
Powered by SkillShield