Trust Assessment
apollo received a trust score of 79/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Suspicious import: urllib.request, Arbitrary File Read for Bulk Enrichment.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Arbitrary File Read for Bulk Enrichment The `bulk-enrich` command in `apollo.py` allows reading an arbitrary file path specified by the user via the `--file` argument. If an attacker can manipulate the LLM to provide a path to a sensitive file (e.g., `/etc/passwd`, `/app/secrets.json`, `~/.ssh/id_rsa`), the skill will read its content. This data could then be exfiltrated to the Apollo API (if it matches the expected JSON structure) or printed to standard output (especially if combined with the `--json` flag), potentially exposing confidential information. Restrict file access to a specific, sandboxed directory or validate file paths more rigorously to prevent access to sensitive system files. Alternatively, consider if direct file system access is truly necessary; perhaps the JSON data could be passed directly as an argument instead of a file path. Ensure that the skill operates within a secure execution environment that limits its filesystem permissions. | LLM | apollo.py:265 | |
| MEDIUM | Suspicious import: urllib.request Import of 'urllib.request' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/andrewdmwalker/apollo-enrichment/apollo.py:17 |
Scan History
Embed Code
[](https://skillshield.io/report/7e1791f8589d2f52)
Powered by SkillShield