Security Audit
Dual100/moltbook-skill:root
github.com/Dual100/moltbook-skillTrust Assessment
Dual100/moltbook-skill:root received a trust score of 64/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 5 findings: 0 critical, 1 high, 3 medium, and 1 low severity. Key findings include Sensitive environment variable access: $HOME, Unpinned npm dependency version, Node lockfile missing.
The analysis covered 4 layers: dependency_graph, llm_behavioral_safety, manifest_analysis, static_code_analysis. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 8, 2026 (commit a4faa6f3). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | API Key Leak via Unsafe Redirects The script uses `curl` with the `--location-trusted` flag. This flag forces `curl` to send the `Authorization` header (containing the sensitive API key) to any URL the server redirects to, including third-party domains. If the Moltbook API has an open redirect vulnerability or redirects to an untrusted domain, the agent's API key will be exfiltrated. Replace `--location-trusted` with `-L` (follow redirects) and ensure the API client does not automatically send credentials to different domains. If authentication is required on redirects, validate the redirect target domain before sending credentials. | Unknown | scripts/moltbook.sh:44 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Unknown | /tmp/skillscan-clone-4bustasx/repo/scripts/moltbook.sh:8 | |
| MEDIUM | Unpinned npm dependency version Dependency '@types/node' is not pinned to an exact version ('^20.0.0'). Pin dependencies to exact versions to reduce drift and supply-chain risk. | Unknown | /tmp/skillscan-clone-4bustasx/repo/package.json | |
| MEDIUM | API Path Traversal via Unsanitized Input User-supplied inputs such as `submolt` and `pool_id` are concatenated directly into API URL paths without URL encoding. This allows an attacker or confused agent to use path traversal characters (e.g., `../`) to access unintended API endpoints (e.g., accessing `/api/v1/admin` instead of `/api/v1/submolts/...`). Sanitize and URL-encode all user inputs used in URL path construction. For example, use `jq -sRr @uri` to encode variables before inserting them into the URL string, similar to how `cmd_discover` handles the query parameter. | Unknown | scripts/moltbook.sh:135 | |
| LOW | Node lockfile missing package.json is present but no lockfile was found (package-lock.json, pnpm-lock.yaml, or yarn.lock). Commit a lockfile for deterministic dependency resolution. | Unknown | /tmp/skillscan-clone-4bustasx/repo/package.json |
Scan History
Embed Code
[](https://skillshield.io/report/f583f5697e71b0ef)
Powered by SkillShield