Trust Assessment
compress-pdf received a trust score of 69/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 5 findings: 0 critical, 1 high, 2 medium, and 1 low severity. Key findings include Suspicious import: requests, Potential data exfiltration: file read + network send, Unpinned Python dependency version.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential data exfiltration: file read + network send Function 'create_job' reads files and sends data over the network. This may indicate data exfiltration. Review this function to ensure file contents are not being sent to external servers. | Static | skills/crossservicesolutions/compress-pdf/scripts/compress-pdf.py:58 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/crossservicesolutions/compress-pdf/scripts/compress-pdf.py:24 | |
| MEDIUM | Unpinned Python dependency version Requirement 'requests>=2.32.0' is not pinned to an exact version. Pin Python dependencies with '==<exact version>'. | Dependencies | skills/crossservicesolutions/compress-pdf/requirements.txt:1 | |
| LOW | Loosely pinned dependency 'requests' The 'requests' library is pinned with a minimum version (`requests>=2.32.0`) rather than an exact version (`requests==2.32.0`). While this allows for security updates, it also permits the installation of any future version, which could introduce breaking changes or new vulnerabilities without explicit review. Best practice for production environments is often to pin exact versions to ensure deterministic builds and prevent unexpected behavior. Consider pinning the 'requests' dependency to an exact version (e.g., `requests==2.32.0`) to ensure deterministic builds and prevent unexpected behavior from future updates. Regularly review and update dependencies. | LLM | requirements.txt:1 | |
| INFO | Suspicious provider name/domain 'XSS' The provider name 'Cross-Service-Solutions (XSS)' and its associated domain 'api.xss-cross-service-solutions.com' use the acronym 'XSS', which is widely known for Cross-Site Scripting vulnerabilities. While this might be a legitimate company name, it could be perceived as a social engineering tactic or typosquatting attempt to lower user vigilance, potentially leading to a supply chain risk if users are less cautious about interacting with the service. Investigate the legitimacy of the provider. If legitimate, consider if the naming could be confusing or misleading to users. If not legitimate, avoid using this service. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/e0cdc9d3a6eeab07)
Powered by SkillShield