Trust Assessment
manifold received a trust score of 79/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Sensitive environment variable access: $USER, Potential Command Injection via Unsanitized User Input.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Unsanitized User Input The skill provides shell command examples that incorporate placeholders such as `USERNAME`, `MARKET_ID`, and `MARKET_SLUG`. If an LLM constructs these commands using untrusted user-provided input for these placeholders without proper sanitization (e.g., escaping shell metacharacters), it could lead to command injection. This allows an attacker to execute arbitrary commands on the host system. A specific example is the construction of `USER_ID` using command substitution, where a malicious `USERNAME` could break out of the `curl` command and execute other shell commands. Implement robust input sanitization for all user-provided values before they are incorporated into shell commands. This typically involves escaping shell metacharacters (e.g., using `shlex.quote()` in Python) or using a dedicated library/function for safe command construction. The LLM should be explicitly instructed on how to sanitize these inputs to prevent shell metacharacter injection. | LLM | SKILL.md:68 | |
| MEDIUM | Sensitive environment variable access: $USER Access to sensitive environment variable '$USER' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/crotalus/manifold/SKILL.md:66 |
Scan History
Embed Code
[](https://skillshield.io/report/179815103beb9e37)
Powered by SkillShield