Trust Assessment
arc-creator received a trust score of 65/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 1 critical, 0 high, 1 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, Direct interpolation of user input into shell command arguments.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Direct interpolation of user input into shell command arguments The skill instructs the LLM to execute shell commands by directly interpolating user-provided input (e.g., file paths, identifiers, titles, descriptions) as arguments. Without proper shell escaping of these inputs, a malicious user can inject arbitrary shell commands by including metacharacters (e.g., `;`, `&&`, `|`, `$(...)`, backticks) in their input. This allows for arbitrary code execution on the host system where the LLM is running. This vulnerability applies to all commands where user input is directly used in the command line. All user-provided inputs intended for shell command arguments must be rigorously sanitized and shell-escaped before command execution. For example, use a function equivalent to Python's `shlex.quote()` for each argument. Additionally, consider running shell commands in a sandboxed environment with minimal privileges to limit the impact of any successful injection. | LLM | SKILL.md:23 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/ingogiebel/arc-creator/scripts/create_arc.sh:14 |
Scan History
Embed Code
[](https://skillshield.io/report/3492e979fa749351)
Powered by SkillShield