Trust Assessment
0x-swap received a trust score of 90/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via unquoted jq -r output.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via unquoted jq -r output The skill demonstrates parsing JSON responses from an external API using `jq -r` and assigning the raw output to shell variables (e.g., `TX_TO`, `TX_DATA`). The `-r` flag outputs raw strings, which can contain shell metacharacters. If these variables are subsequently used in shell commands without proper quoting (e.g., `some_command $TX_TO` instead of `some_command "$TX_TO"`), a malicious or compromised API response could inject arbitrary shell commands. For instance, if the `.transaction.to` field in the API response contained `0xMaliciousAddress; rm -rf /`, the `TX_TO` variable would hold this string, and an unquoted usage would execute `rm -rf /`. While the provided example stops before showing the execution of these variables, the pattern sets up a credible vulnerability. Always quote shell variables when they contain data derived from untrusted sources and are used in contexts where shell metacharacters could be interpreted. For example, use `some_command --to "$TX_TO"`. Alternatively, use a programming language with safer subprocess execution methods that do not rely on shell interpretation of arguments. | LLM | SKILL.md:105 |
Scan History
Embed Code
[](https://skillshield.io/report/2322bc7c574068e8)
Powered by SkillShield