Trust Assessment
cwicr-rate-updater received a trust score of 66/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 0 critical, 2 high, 1 medium, and 0 low severity. Key findings include Missing required field: name, Arbitrary File Write via export_change_log, Arbitrary File Write via export_updated_data.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Arbitrary File Write via export_change_log The `export_change_log` method directly uses the `output_path` argument to write an Excel file. If an untrusted user can control `output_path`, they could specify arbitrary file paths (e.g., using path traversal like `../../../../etc/passwd`), leading to overwriting or creating files in sensitive system locations. This could enable command injection by writing to executable paths or configuration files. Implement strict validation and sanitization of `output_path`. Restrict file writes to a designated, sandboxed directory. Consider generating unique filenames (e.g., using UUIDs) and returning the generated path, rather than allowing arbitrary user-provided paths. | LLM | SKILL.md:314 | |
| HIGH | Arbitrary File Write via export_updated_data The `export_updated_data` method directly uses the `output_path` argument to write a Parquet or Excel file. If an untrusted user can control `output_path`, they could specify arbitrary file paths (e.g., using path traversal like `../../../../etc/passwd`), leading to overwriting or creating files in sensitive system locations. This could enable command injection by writing to executable paths or configuration files. Implement strict validation and sanitization of `output_path`. Restrict file writes to a designated, sandboxed directory. Consider generating unique filenames (e.g., using UUIDs) and returning the generated path, rather than allowing arbitrary user-provided paths. | LLM | SKILL.md:332 | |
| MEDIUM | Missing required field: name The 'name' field is required for claude_code skills but is missing from frontmatter. Add a 'name' field to the SKILL.md frontmatter. | Static | skills/datadrivenconstruction/cwicr-rate-updater/SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/92d234f0ca0df0a3)
Powered by SkillShield