Security Audit
dkyazzentwatwa/chatgpt-skills:flowchart-generator
github.com/dkyazzentwatwa/chatgpt-skillsTrust Assessment
dkyazzentwatwa/chatgpt-skills:flowchart-generator received a trust score of 59/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 4 findings: 0 critical, 2 high, 2 medium, and 0 low severity. Key findings include Unpinned Python dependency version, Arbitrary File Read via CLI Input, Arbitrary File Write via CLI Output.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 24, 2026 (commit d4bad335). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Arbitrary File Read via CLI Input The skill's CLI interface allows reading from an arbitrary file path specified by the `--input` argument. An attacker could use this to attempt to read sensitive files from the system (e.g., `/etc/passwd`, `/app/secrets.env`). Although `yaml.safe_load` and `json.load` are used, preventing code execution from the file content, the ability to read arbitrary files is a data exfiltration risk. Restrict the `--input` argument to a specific, sandboxed directory or validate the file path to ensure it's within an allowed scope. If the skill is intended to operate only on user-provided content, consider passing the content directly rather than a file path, or implement strict path sanitization and confinement. | LLM | scripts/flowchart_gen.py:403 | |
| HIGH | Arbitrary File Write via CLI Output The skill's CLI interface allows writing to an arbitrary file path specified by the `--output` argument. An attacker could use this to overwrite existing system files, write malicious content to web server directories, or fill up disk space, leading to denial of service or integrity compromise. Restrict the `--output` argument to a specific, sandboxed directory or validate the file path to ensure it's within an allowed scope. Implement strict path sanitization and confinement to prevent writing to sensitive system locations. | LLM | scripts/flowchart_gen.py:404 | |
| MEDIUM | Unpinned Python dependency version Requirement 'graphviz>=0.20.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | flowchart-generator/scripts/requirements.txt:1 | |
| MEDIUM | Unpinned Python dependency version Requirement 'PyYAML>=6.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | flowchart-generator/scripts/requirements.txt:2 |
Scan History
Embed Code
[](https://skillshield.io/report/b59665d6be70bb12)
Powered by SkillShield