Security Audit
ferminrp/agent-skills:skills/data912-market-data
github.com/ferminrp/agent-skillsTrust Assessment
ferminrp/agent-skills:skills/data912-market-data received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via Unsanitized Ticker Symbol.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 24, 2026 (commit 84b0da63). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Unsanitized Ticker Symbol The skill instructs the agent to construct shell commands (e.g., `curl`) using user-provided ticker symbols. The examples show direct interpolation of a `{ticker}` placeholder into the URL path. If the agent directly substitutes user input for `{ticker}` without proper sanitization (e.g., escaping shell metacharacters), a malicious user could inject arbitrary shell commands. For instance, a ticker like `AAPL; rm -rf /` could lead to arbitrary command execution on the host system where the `curl` command is run, potentially causing data loss, system compromise, or data exfiltration. Implement robust input validation and sanitization for all user-provided ticker symbols before they are used in shell commands. Specifically, escape or disallow shell metacharacters (e.g., `;`, `&`, `|`, `$`, `(`, `)`, `` ` ``, `<`, `>`, `\`, `*`, `?`, `[`, `]`, `#`, `!`, ` `, `\n`) when constructing the `curl` command. Alternatively, use a dedicated HTTP client library that handles URL encoding and command construction safely, rather than directly interpolating into a shell string. | Static | SKILL.md:39 |
Scan History
Embed Code
[](https://skillshield.io/report/8c20f34a825713ea)
Powered by SkillShield