Trust Assessment
cwicr-schedule-integrator received a trust score of 65/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 0 critical, 2 high, 1 medium, and 0 low severity. Key findings include Missing required field: name, Arbitrary File Write via `export_cash_flow`, Arbitrary File Read via `import_schedule_from_csv`.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Arbitrary File Write via `export_cash_flow` The `export_cash_flow` method allows writing an Excel file to an arbitrary path specified by the `output_path` parameter. An attacker could exploit this to overwrite critical system files, write to sensitive directories, or potentially exfiltrate data by writing to a network share if the agent has sufficient write permissions. The `output_path` is not sanitized or validated. Implement strict validation for `output_path` to ensure it points to a safe, allowed directory (e.g., a temporary directory or a user-specific output directory). Avoid allowing arbitrary file paths. Consider sandboxing the execution environment or restricting file system access for the skill. | LLM | SKILL.md:220 | |
| HIGH | Arbitrary File Read via `import_schedule_from_csv` The `import_schedule_from_csv` method allows reading arbitrary CSV files from the file system using the `schedule_file` and `work_items_file` parameters. An attacker could exploit this to read sensitive system files (e.g., `/etc/passwd`, configuration files, SSH keys) and potentially exfiltrate their content if combined with other functionalities or if the agent's response includes the file content. The file paths are not sanitized or validated. Implement strict validation for `schedule_file` and `work_items_file` to ensure they point to safe, allowed directories. Avoid allowing arbitrary file paths. Consider sandboxing the execution environment or restricting file system access for the skill. | LLM | SKILL.md:250 | |
| MEDIUM | Missing required field: name The 'name' field is required for claude_code skills but is missing from frontmatter. Add a 'name' field to the SKILL.md frontmatter. | Static | skills/datadrivenconstruction/cwicr-schedule-integrator/SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/66965958df7feb48)
Powered by SkillShield