Security Audit
gracefullight/stock-checker:.agent/skills/yahoo-finance
github.com/gracefullight/stock-checkerTrust Assessment
gracefullight/stock-checker:.agent/skills/yahoo-finance received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 6 findings: 3 critical, 0 high, 3 medium, and 0 low severity. Key findings include Persistence / self-modification instructions, Arbitrary command execution, Remote code execution: curl/wget pipe to shell.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 24, 2026 (commit 4a711df6). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings6
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Persistence / self-modification instructions Shell RC file modification for persistence Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | .agent/skills/yahoo-finance/SKILL.md:43 | |
| CRITICAL | Arbitrary command execution Remote code download piped to interpreter Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | .agent/skills/yahoo-finance/SKILL.md:23 | |
| CRITICAL | Remote code execution: curl/wget pipe to shell Detected a pattern that downloads and immediately executes remote code. This is a primary malware delivery vector. Never pipe curl/wget output directly to a shell interpreter. | Static | .agent/skills/yahoo-finance/SKILL.md:23 | |
| MEDIUM | Persistence mechanism: Shell RC file modification Detected Shell RC file modification pattern. Persistence mechanisms allow malware to survive system restarts. Review this persistence pattern. Skills should not modify system startup configuration. | Static | .agent/skills/yahoo-finance/SKILL.md:43 | |
| MEDIUM | Insecure dependency installation method recommended The skill documentation recommends installing the `uv` package manager using `curl | sh` on macOS/Linux and `powershell | iex` on Windows. These methods execute arbitrary code downloaded directly from the internet without prior inspection or verification. While `astral.sh` is the official source for `uv`, a compromise of their server or CDN could lead to users executing malicious code on their systems. Recommend safer installation methods, such as using a package manager (e.g., Homebrew) or `pip install uv` which is also provided as an option and generally leverages Python's package management and hashing for integrity. If `curl | sh` is deemed necessary, advise users to inspect the script before execution. | LLM | SKILL.md:19 | |
| MEDIUM | Insecure dependency installation method recommended (Windows) The skill documentation recommends installing the `uv` package manager using `powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"` on Windows. This method executes arbitrary code downloaded directly from the internet without prior inspection or verification. While `astral.sh` is the official source for `uv`, a compromise of their server or CDN could lead to users executing malicious code on their systems. Recommend safer installation methods, such as using a package manager or `pip install uv` which is also provided as an option and generally leverages Python's package management and hashing for integrity. If `irm | iex` is deemed necessary, advise users to inspect the script before execution. | LLM | SKILL.md:24 |
Scan History
Embed Code
[](https://skillshield.io/report/6019e913ea5f39f6)
Powered by SkillShield