Trust Assessment
apple-serial-lookup received a trust score of 86/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via unsanitized serial number in shell command.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via unsanitized serial number in shell command The skill's workflow, described in SKILL.md, explicitly instructs the LLM to execute a shell command: `python3 scripts/decode_serial.py <SERIAL>`. If the `<SERIAL>` placeholder is directly substituted with untrusted user input without proper shell escaping or sanitization by the LLM orchestrator, it could lead to arbitrary command execution. A malicious serial number like `12345; rm -rf /` could be used to execute arbitrary commands on the host system. The LLM orchestrator must ensure that any user-provided input substituted into shell commands is properly escaped or quoted to prevent command injection. A more robust solution would be to refactor the skill to expose the `decode_serial` functionality as a direct Python function call, avoiding shell execution entirely. | LLM | SKILL.md:10 |
Scan History
Embed Code
[](https://skillshield.io/report/17ca9f9de1a946b8)
Powered by SkillShield