Trust Assessment
cloudflare-r2 received a trust score of 93/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, API Token Exposed as Environment Variable.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/dongsjoa-byte/cloudflare-r2/scripts/r2-upload.sh:7 | |
| INFO | API Token Exposed as Environment Variable The script reads the Cloudflare API token from a configuration file and exports it as an environment variable (`CLOUDFLARE_API_TOKEN`). While this is a common method for CLI tools like `wrangler` to consume credentials, environment variables can be inherited by child processes and may be visible in process listings (e.g., `ps aux` for a short duration), increasing the risk of accidental exposure or capture by other processes on the system. This practice is generally less secure than passing secrets via standard input or a dedicated secure vault. Consider using `wrangler`'s direct credential passing mechanisms if available, or a more secure secret management solution that avoids exposing sensitive data in environment variables. If `wrangler` strictly requires environment variables, ensure the execution environment is tightly controlled and ephemeral, and revoke tokens promptly if compromised. | LLM | scripts/r2-upload.sh:13 |
Scan History
Embed Code
[](https://skillshield.io/report/3989a01a63ac4769)
Powered by SkillShield