Trust Assessment
ez-cronjob received a trust score of 94/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Skill instructs agent to use `exec` for shell command execution.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Skill instructs agent to use `exec` for shell command execution The skill explicitly instructs the AI agent to use the `exec` (or `bash`) tool to run `clawdbot cron` commands. While this is the intended functionality for managing cron jobs within the `clawdbot` ecosystem, the `exec` tool allows arbitrary shell command execution. If the AI agent constructs these commands using unsanitized user input, it could lead to command injection vulnerabilities, allowing an attacker to execute arbitrary commands on the host system. The skill itself does not demonstrate malicious injection, but it normalizes and instructs the use of a high-privilege command execution tool. Ensure the AI agent strictly sanitizes all user-provided input before incorporating it into commands executed via `exec` or `bash`. Implement robust input validation and consider whitelisting allowed commands and arguments. Limit the scope of the `exec` tool's permissions if possible. | LLM | SKILL.md:57 |
Scan History
Embed Code
[](https://skillshield.io/report/9d024b14e9aafbea)
Powered by SkillShield