Trust Assessment
cicd-pipeline received a trust score of 98/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 0 medium, and 1 low severity. Key findings include Unpinned GitHub Action version.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| LOW | Unpinned GitHub Action version The skill's example uses 'dtolnay/rust-toolchain@stable', which is not pinned to a specific version or commit SHA. While the skill itself recommends pinning to SHA for supply chain security, this example does not consistently follow that best practice. Using mutable tags like 'stable' or major versions (e.g., '@v4') can introduce supply chain risks if the action's content changes unexpectedly or maliciously, potentially leading to breaking changes or the introduction of vulnerabilities without explicit user action. Pin GitHub Actions to a specific commit SHA or a more granular version tag (e.g., 'v1.2.3') instead of mutable tags like 'stable' or major versions (e.g., '@v4'). The skill itself recommends this practice: 'Pin action versions to SHA for supply chain security: uses: actions/checkout@b4ffde...' | LLM | SKILL.md:112 |
Scan History
Embed Code
[](https://skillshield.io/report/4c8d583f66e88888)
Powered by SkillShield