Trust Assessment
harrypotter received a trust score of 90/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via User Input in Skill Arguments.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via User Input in Skill Arguments The skill's `SKILL.md` defines commands that accept user-controlled input (e.g., `<name>` for `harrypotter house` and `<query>` for `harrypotter search`). These inputs are passed to a shell script (`harrypotter`), as indicated by the `bash` requirement in the manifest. If the underlying script does not properly sanitize or escape these arguments before using them in shell commands (e.g., `eval`, backticks, or direct interpolation into `curl` commands), an attacker could inject arbitrary shell commands, leading to remote code execution. The underlying `harrypotter` script must implement robust input sanitization and escaping for all user-provided arguments. Avoid direct interpolation of user input into shell commands. Use safe argument passing mechanisms (e.g., `$@` with `set -e` and `set -u` in bash, or specific shell functions that handle quoting) and ensure all external commands (like `curl`) receive properly quoted arguments. | LLM | SKILL.md:30 |
Scan History
Embed Code
[](https://skillshield.io/report/98d46c88a92ddeb5)
Powered by SkillShield