Trust Assessment
senior-architect received a trust score of 71/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 5 findings: 0 critical, 0 high, 4 medium, and 1 low severity. Key findings include Network egress to untrusted endpoints, Covert behavior / concealment directives, Arbitrary File Write via Output Argument.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 458b1186). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | cli-tool/components/mcps/devtools/figma-dev-mode.json:4 | |
| MEDIUM | Arbitrary File Write via Output Argument The Python scripts (`architecture_diagram_generator.py`, `dependency_analyzer.py`, `project_architect.py`) allow users to specify an arbitrary output file path using the `--output` or `-o` argument. The script then writes the JSON results to this specified file. While the current JSON output contains non-sensitive information (status, target path, empty findings), this capability could be abused to overwrite or create files in arbitrary locations on the filesystem. This could lead to denial of service by overwriting critical system files or facilitate other attacks if combined with other vulnerabilities, even if the content written is not inherently malicious. Restrict output file paths to a designated, sandboxed directory. Implement checks to prevent writing to sensitive system paths (e.g., `/etc`, `/bin`, `/usr`). If writing to arbitrary paths is necessary, ensure the user has explicitly confirmed the action and understands the implications, or use a temporary file within a safe directory. | LLM | scripts/architecture_diagram_generator.py:100 | |
| MEDIUM | Arbitrary File Write via Output Argument The Python scripts (`architecture_diagram_generator.py`, `dependency_analyzer.py`, `project_architect.py`) allow users to specify an arbitrary output file path using the `--output` or `-o` argument. The script then writes the JSON results to this specified file. While the current JSON output contains non-sensitive information (status, target path, empty findings), this capability could be abused to overwrite or create files in arbitrary locations on the filesystem. This could lead to denial of service by overwriting critical system files or facilitate other attacks if combined with other vulnerabilities, even if the content written is not inherently malicious. Restrict output file paths to a designated, sandboxed directory. Implement checks to prevent writing to sensitive system paths (e.g., `/etc`, `/bin`, `/usr`). If writing to arbitrary paths is necessary, ensure the user has explicitly confirmed the action and understands the implications, or use a temporary file within a safe directory. | LLM | scripts/dependency_analyzer.py:100 | |
| MEDIUM | Arbitrary File Write via Output Argument The Python scripts (`architecture_diagram_generator.py`, `dependency_analyzer.py`, `project_architect.py`) allow users to specify an arbitrary output file path using the `--output` or `-o` argument. The script then writes the JSON results to this specified file. While the current JSON output contains non-sensitive information (status, target path, empty findings), this capability could be abused to overwrite or create files in arbitrary locations on the filesystem. This could lead to denial of service by overwriting critical system files or facilitate other attacks if combined with other vulnerabilities, even if the content written is not inherently malicious. Restrict output file paths to a designated, sandboxed directory. Implement checks to prevent writing to sensitive system paths (e.g., `/etc`, `/bin`, `/usr`). If writing to arbitrary paths is necessary, ensure the user has explicitly confirmed the action and understands the implications, or use a temporary file within a safe directory. | LLM | scripts/project_architect.py:100 | |
| LOW | Covert behavior / concealment directives Multiple zero-width characters (stealth text) Remove hidden instructions, zero-width characters, and bidirectional overrides. Skill instructions should be fully visible and transparent to users. | Manifest | cli-tool/components/mcps/devtools/jfrog.json:4 |
Scan History
Embed Code
[](https://skillshield.io/report/d7cd609a84b753b7)
Powered by SkillShield