Trust Assessment
modelready received a trust score of 73/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via User-Supplied Arguments.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Potential Command Injection via User-Supplied Arguments The skill manifest indicates a dependency on `bash` and `curl`, suggesting that shell commands are executed. The `SKILL.md` describes commands like `/modelready start` which accepts a `repo` argument (e.g., `repo=<path-or-hf-repo>`) and `/modelready set_ip` which accepts an `ip` argument. If these user-supplied arguments are directly interpolated into shell commands without proper sanitization or validation, an attacker could inject arbitrary shell commands. For example, providing `repo='; rm -rf /;'` could lead to arbitrary code execution on the host system. All user-supplied arguments (`repo`, `port`, `ip`, `text`, `tp`, `dtype`) must be strictly validated and sanitized before being used in any shell command. For file paths or repository names, ensure they conform to expected patterns and do not contain shell metacharacters. For network parameters like `port` and `ip`, validate them as integers or valid network addresses respectively. Prefer using libraries or functions that safely execute external commands with parameterized arguments rather than direct string interpolation. | LLM | SKILL.md:30 |
Scan History
Embed Code
[](https://skillshield.io/report/af88c55d21d717d7)
Powered by SkillShield