Trust Assessment
molt-security-auditor-v3 received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 9 findings: 8 critical, 1 high, 0 medium, and 0 low severity. Key findings include Arbitrary command execution, Unsafe deserialization / dynamic eval, Arbitrary File Overwrite via Path Traversal in Rollback Script.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings9
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Arbitrary command execution Node.js child_process require Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:4 | |
| CRITICAL | Arbitrary command execution Node.js child_process require Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/rollback.js:3 | |
| CRITICAL | Arbitrary command execution Node.js synchronous shell execution Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:49 | |
| CRITICAL | Arbitrary command execution Node.js synchronous shell execution Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:56 | |
| CRITICAL | Arbitrary command execution Node.js synchronous shell execution Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:63 | |
| CRITICAL | Arbitrary command execution Node.js synchronous shell execution Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:66 | |
| CRITICAL | Arbitrary command execution Node.js synchronous shell execution Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:94 | |
| CRITICAL | Arbitrary File Overwrite via Path Traversal in Rollback Script The `scripts/rollback.js` script is designed to restore backup files. It iterates through files in the `backup` directory and constructs the target path for restoration using `path.resolve('/', b.replace('.bak', ''))`, where `b` is a filename read directly from the `backup` directory. This method is vulnerable to path traversal. If an attacker can place a specially crafted file (e.g., `../../etc/passwd.bak`) into the `backup` directory, the `rollback.js` script will attempt to copy this malicious file to `/etc/passwd` when executed. This allows an attacker to overwrite arbitrary system files, potentially leading to privilege escalation or system compromise, especially if the rollback script is run with elevated privileges (which is implied for system-level rollbacks). The skill's manifest claims '100% secure—no injection', which is directly contradicted by this vulnerability. Implement strict validation for filenames read from the `BACKUP_DIR` to prevent path traversal characters (e.g., `..`, `/`). Only allow whitelisted filenames or ensure that `b` is a simple filename without directory separators. Additionally, implement integrity checks (e.g., SHA256 hashes) for backup files to ensure they haven't been tampered with before restoration, as mentioned in the `SKILL.md` documentation for 'SHA verify'. | LLM | scripts/rollback.js:7 | |
| HIGH | Unsafe deserialization / dynamic eval Decryption followed by code execution Remove obfuscated code execution patterns. Legitimate code does not need base64-encoded payloads executed via eval, encrypted-then-executed blobs, or dynamic attribute resolution to call system functions. | Manifest | skills/kunoiiv/molt-security-auditor-v3/scripts/audit.js:57 |
Scan History
Embed Code
[](https://skillshield.io/report/a58652a1a739cc3e)
Powered by SkillShield