Trust Assessment
cfg-diff received a trust score of 28/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 4 findings: 2 critical, 0 high, 2 medium, and 0 low severity. Key findings include File read + network send exfiltration, Missing required field: name, Sensitive path access: Environment file.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | File read + network send exfiltration .env file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/sa9saq/cfg-diff/SKILL.md:19 | |
| CRITICAL | Potential Command Injection via External Tool Execution The skill explicitly states it uses external shell commands (`diff`, `jq`, `yq`) to process user-provided configuration files. The 'Usage' section indicates that filenames will be derived from user input (e.g., 'Compare config.yml and config.production.yml'). If these filenames or other arguments passed to the shell commands are not rigorously sanitized, an attacker could inject arbitrary shell commands, leading to remote code execution on the host system. Implement robust input validation and sanitization for all user-provided data used in shell commands. Prefer using language-native libraries for file parsing and diffing (e.g., Python's `difflib`, `json`, `yaml` libraries) instead of external shell utilities. If external commands are strictly necessary, execute them using safe methods (e.g., `subprocess.run` with `shell=False` and passing arguments as a list) to prevent command injection. | LLM | SKILL.md:24 | |
| MEDIUM | Missing required field: name The 'name' field is required for claude_code skills but is missing from frontmatter. Add a 'name' field to the SKILL.md frontmatter. | Static | skills/sa9saq/cfg-diff/SKILL.md:1 | |
| MEDIUM | Sensitive path access: Environment file Access to Environment file path detected: '.env.local'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/sa9saq/cfg-diff/SKILL.md:19 |
Scan History
Embed Code
[](https://skillshield.io/report/8e1b3ce692f75414)
Powered by SkillShield