Trust Assessment
discord-server-ctrl received a trust score of 81/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 3 findings: 0 critical, 0 high, 3 medium, and 0 low severity. Key findings include JSON injection via unescaped content in msg-send, JSON injection via unescaped message content in msg-send-file, JSON injection via unescaped content in webhook-execute.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | JSON injection via unescaped content in msg-send The `content` argument in the `msg-send` command within `discord-admin.sh` is directly interpolated into a JSON string without proper escaping. If the user-provided content contains double quotes (`"`) or other JSON-breaking characters, it can lead to invalid JSON, causing the Discord API call to fail. A malicious user could craft content to disrupt the JSON structure, potentially leading to API errors or unexpected behavior. Escape the `$content` variable for JSON before embedding it into the payload. For example, use `jq -n --arg content "$content" '{content: $content}'` to construct the JSON payload safely. | LLM | discord-admin.sh:268 | |
| MEDIUM | JSON injection via unescaped message content in msg-send-file The `message` argument in the `msg-send-file` command within `discord-admin.sh` is directly interpolated into a JSON string without proper escaping. If the user-provided message contains double quotes (`"`) or other JSON-breaking characters, it can lead to invalid JSON, causing the Discord API call to fail. A malicious user could craft a message to disrupt the JSON structure, potentially leading to API errors or unexpected behavior. Escape the `$message` variable for JSON before embedding it into `payload_json`. For example, use `jq -n --arg content "$message" '{content: $content}'` to construct the JSON payload safely. | LLM | discord-admin.sh:280 | |
| MEDIUM | JSON injection via unescaped content in webhook-execute The `content` argument in the `webhook-execute` command within `discord-admin.sh` is directly interpolated into a JSON string without proper escaping. If the user-provided content contains double quotes (`"`) or other JSON-breaking characters, it can lead to invalid JSON, causing the Discord API call to fail. A malicious user could craft content to disrupt the JSON structure, potentially leading to API errors or unexpected behavior. Escape the `$content` variable for JSON before embedding it into `payload`. For example, use `jq -n --arg content "$content" '{content: $content}'` to construct the initial JSON payload safely. | LLM | discord-admin.sh:338 |
Scan History
Embed Code
[](https://skillshield.io/report/6d47a56b555e7253)
Powered by SkillShield