Trust Assessment
openalex-database received a trust score of 81/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 4 findings: 0 critical, 0 high, 2 medium, and 2 low severity. Key findings include Suspicious import: requests, Network egress to untrusted endpoints, Covert behavior / concealment directives.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 458b1186). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | cli-tool/components/skills/scientific/openalex-database/scripts/openalex_client.py:13 | |
| MEDIUM | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | cli-tool/components/mcps/devtools/figma-dev-mode.json:4 | |
| LOW | Covert behavior / concealment directives Multiple zero-width characters (stealth text) Remove hidden instructions, zero-width characters, and bidirectional overrides. Skill instructions should be fully visible and transparent to users. | Manifest | cli-tool/components/mcps/devtools/jfrog.json:4 | |
| LOW | Unpinned Dependency in Installation Instructions The installation instructions recommend installing the 'requests' package without specifying a version. This introduces a supply chain risk, as a malicious or incompatible version of the package could be installed if a new version with vulnerabilities or breaking changes is released. While 'requests' is a widely used and generally trusted library, best practice dictates pinning dependencies to specific versions or ranges. Pin the 'requests' dependency to a specific version or version range in a `requirements.txt` file or directly in the installation command (e.g., `uv pip install requests==2.28.1`). | LLM | SKILL.md:25 |
Scan History
Embed Code
[](https://skillshield.io/report/9da65b639c01262b)
Powered by SkillShield