Trust Assessment
clawddocs received a trust score of 72/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Agent instructed to execute shell scripts with user-controlled input.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Agent instructed to execute shell scripts with user-controlled input The skill explicitly instructs the agent to execute local shell scripts (`./scripts/search.sh`, `./scripts/fetch-doc.sh`) with arguments that are directly derived from user input (e.g., `<keyword>`, `<path>`). This pattern creates a direct command injection vulnerability. If the underlying shell scripts do not rigorously sanitize and validate these user-provided arguments, an attacker could inject arbitrary shell commands, leading to remote code execution, data exfiltration, or system compromise. The content of the scripts themselves is not provided, but the instruction to execute them with untrusted input is a critical security risk. 1. Provide the source code of all `./scripts/*.sh` files for security review. 2. Implement robust input sanitization and validation within the shell scripts for all arguments derived from user input. 3. Consider using safer, language-native alternatives to shell scripts for operations like searching and fetching, or ensure the agent interacts with a secure API for these actions instead of direct shell execution. 4. If shell execution is unavoidable, ensure arguments are passed as distinct, properly quoted arguments to the script (e.g., `script.sh "$1"`) and avoid embedding user input directly into shell command strings. | LLM | SKILL.md:100 |
Scan History
Embed Code
[](https://skillshield.io/report/9ab36ddced1b9e14)
Powered by SkillShield