Trust Assessment
md-linter received a trust score of 69/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 4 findings: 0 critical, 1 high, 3 medium, and 0 low severity. Key findings include Missing required field: name, Potential Command Injection via external linter, Broad File System Access Required.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via external linter The skill description indicates it 'Can use `markdownlint-cli` if available'. If the skill invokes `markdownlint-cli` via a shell command and passes unsanitized user-provided file paths or arguments, it could be vulnerable to command injection. An attacker could craft a malicious file path (e.g., `'; rm -rf /'`) to execute arbitrary commands on the host system. Implement robust input sanitization and validation for all user-provided arguments before passing them to external command-line tools like `markdownlint-cli`. Prefer using a library's API directly if available, or execute commands using a method that avoids shell interpretation (e.g., `subprocess.run` with `shell=False` and arguments as a list). | LLM | SKILL.md:29 | |
| MEDIUM | Missing required field: name The 'name' field is required for claude_code skills but is missing from frontmatter. Add a 'name' field to the SKILL.md frontmatter. | Static | skills/sa9saq/md-linter/SKILL.md:1 | |
| MEDIUM | Broad File System Access Required The skill's stated capabilities, such as 'Check all markdown files in this directory' and 'Fix formatting issues in docs/', imply broad read and write access to the file system. If the skill is not executed within a strictly sandboxed environment with granular permissions, it could potentially access or modify sensitive files outside its intended scope. Implement the skill with the principle of least privilege. Restrict file system access to only the necessary directories and file types. Utilize sandboxing mechanisms or virtual file systems to limit the skill's operational scope. Ensure user confirmation for write operations on sensitive files or directories. | LLM | SKILL.md:16 | |
| MEDIUM | Unpinned External Dependency The skill's requirements section suggests installing `markdownlint-cli` using `npm install -g markdownlint-cli`. This command does not specify a version, making it an unpinned dependency. Relying on unpinned dependencies introduces a supply chain risk, as a future malicious or vulnerable version of `markdownlint-cli` could be installed, compromising the skill's integrity or the host system. Always pin external dependencies to a specific, known-good version (e.g., `npm install -g markdownlint-cli@0.12.0`). Regularly audit and update dependencies to mitigate known vulnerabilities. | LLM | SKILL.md:33 |
Scan History
Embed Code
[](https://skillshield.io/report/faec7918ba2b9059)
Powered by SkillShield