Security Audit
zyte-api-automation
github.com/ComposioHQ/awesome-claude-skillsTrust Assessment
zyte-api-automation received a trust score of 80/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Skill enables execution of arbitrary Composio tools, Unpinned dependency in manifest.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit 27904475). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Skill enables execution of arbitrary Composio tools The skill documentation explicitly mentions the use of `RUBE_REMOTE_WORKBENCH` with `run_composio_tool()` for 'Bulk ops'. This function allows the execution of any tool available through the Composio ecosystem, not just those related to Zyte API. For a skill focused on 'Zyte API Automation', this grants excessively broad permissions, enabling potential execution of unintended or malicious tools if the LLM is prompted to do so. Restrict the scope of `RUBE_REMOTE_WORKBENCH` calls to only Zyte API-related tools, or clarify that the skill is intended for general Composio tool execution rather than just Zyte API. If `run_composio_tool()` cannot be restricted, consider if this skill truly needs access to all Composio tools. | LLM | SKILL.md:74 | |
| MEDIUM | Unpinned dependency in manifest The skill's manifest specifies a dependency on `mcp: ["rube"]` without a version constraint. This means the skill will always fetch the latest version of the `rube` MCP. This can lead to unexpected behavior due to breaking changes or introduce vulnerabilities if a malicious update is published to the `rube` MCP. Pin the `rube` MCP dependency to a specific, known-good version (e.g., `mcp: ["rube@1.2.3"]`) to ensure stability and security. | LLM | manifest.json |
Scan History
Embed Code
[](https://skillshield.io/report/50a8155b9f78fd3d)
Powered by SkillShield