Trust Assessment
brainstorming received a trust score of 98/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 0 medium, and 1 low severity. Key findings include Broad Read Access to Project Files and History.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| LOW | Broad Read Access to Project Files and History The skill explicitly instructs the LLM to 'Check out the current project state first (files, docs, recent commits)'. This indicates an expectation of broad read access to the entire project's file system and version control history. While this might be necessary for the skill's stated purpose of understanding the project context for brainstorming, it represents a wide scope of data access that could be a concern under the principle of least privilege. Review the necessity of broad read access to all project files and commits. If possible, refine the skill's instructions or underlying tool access to specify only the absolutely required files or directories, or implement mechanisms to confirm user consent for such broad access before execution. | LLM | SKILL.md:14 |
Scan History
Embed Code
[](https://skillshield.io/report/3ad46421f9ecfc56)
Powered by SkillShield