Trust Assessment
gif-whatsapp received a trust score of 73/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 0 critical, 2 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection in `gifgrep` search query, Potential Command Injection and SSRF in `curl` URL.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection in `gifgrep` search query The skill instructs the LLM to use `gifgrep "SEARCH QUERY"` where `SEARCH QUERY` is a placeholder for user input. If the LLM directly substitutes untrusted user input into this command without proper shell escaping, an attacker could inject arbitrary shell commands. For example, `SEARCH QUERY` could be `"; rm -rf /; echo "`. Implement robust shell escaping for the `SEARCH QUERY` placeholder before executing the `gifgrep` command. Ensure that user-provided input is properly quoted and sanitized to prevent injection of shell metacharacters. | LLM | SKILL.md:17 | |
| HIGH | Potential Command Injection and SSRF in `curl` URL The skill instructs the LLM to use `curl -sL "GIF_URL" -o /tmp/gif.gif` where `GIF_URL` is a placeholder. If the LLM directly substitutes an untrusted URL (e.g., from `gifgrep` results or user input) without proper validation or shell escaping, an attacker could inject arbitrary shell commands (e.g., `GIF_URL="http://example.com/a.gif; rm -rf /"`) or perform Server-Side Request Forgery (SSRF) to access internal network resources (e.g., `GIF_URL="file:///etc/passwd"` or `GIF_URL="http://localhost:8080/admin"`). Implement robust validation for `GIF_URL` to ensure it points to a legitimate GIF source and does not contain shell metacharacters. Additionally, ensure proper shell escaping for the URL placeholder. Consider restricting `curl` to only allow specific domains or protocols if possible. | LLM | SKILL.md:23 |
Scan History
Embed Code
[](https://skillshield.io/report/6da0c5399898856b)
Powered by SkillShield