Trust Assessment
holocube received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 10 findings: 9 critical, 1 high, 0 medium, and 0 low severity. Key findings include Network egress to untrusted endpoints, Potential Command Injection via Spotify URI in Pomodoro Script.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings10
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:180 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:183 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:184 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:185 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:186 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:187 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:188 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:191 | |
| CRITICAL | Network egress to untrusted endpoints HTTP request to raw IP address Review all outbound network calls. Remove connections to webhook collectors, paste sites, and raw IP addresses. Legitimate API calls should use well-known service domains. | Manifest | skills/andrewjiang/holocube/SKILL.md:203 | |
| HIGH | Potential Command Injection via Spotify URI in Pomodoro Script The `SKILL.md` describes the `pomodoro.py` script using `spotify.sh` for playback, taking `--spotify-work` and `--spotify-break` arguments. The skill's features also mention 'Optional Spotify playback via AppleScript (macOS)', implying shell execution. If these Spotify URIs are passed directly to `spotify.sh` and then interpolated into a shell command (e.g., `osascript`) without proper sanitization or escaping, a malicious URI could inject arbitrary shell commands. For example, a URI like `spotify:episode:malicious" && rm -rf / && echo "` could lead to remote code execution on the host system. Ensure that the `pomodoro.py` script and the `spotify.sh` script properly sanitize and escape any user-provided Spotify URIs before using them in shell commands. It is highly recommended to use Python's `subprocess` module with `shell=False` and pass arguments as a list to avoid shell injection vulnerabilities, or to use a dedicated Spotify API client library instead of shell scripts for playback control. | LLM | SKILL.md:100 |
Scan History
Embed Code
[](https://skillshield.io/report/cbe40f4e77a06736)
Powered by SkillShield