Trust Assessment
blueclaw1 received a trust score of 72/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Command Injection via unsanitized user input in curl command.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Command Injection via unsanitized user input in curl command The skill constructs a `curl` command by directly embedding `KEYWORDS` extracted from the user's request into the URL query parameters. If `KEYWORDS` contain shell metacharacters (e.g., `;`, `|`, `&`, `$()`, `` ` ``), an attacker could inject arbitrary shell commands, leading to remote code execution on the host system. This is a direct insertion of untrusted user input into a shell execution context. Implement robust sanitization and shell escaping for `KEYWORDS` before incorporating them into the `curl` command. Ideally, use a dedicated HTTP client library in a programming language that handles URL encoding and argument escaping automatically, rather than constructing shell commands with string concatenation. If shell execution is unavoidable, ensure all user-controlled variables are properly quoted and escaped for the shell context. | LLM | SKILL.md:30 |
Scan History
Embed Code
[](https://skillshield.io/report/5a8aefe709edbda6)
Powered by SkillShield