Trust Assessment
nix-mode received a trust score of 72/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Untrusted content attempts to manipulate LLM behavior.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Untrusted content attempts to manipulate LLM behavior The skill's documentation, explicitly marked as untrusted input, contains direct instructions for the host LLM on how to operate (e.g., 'Do not attempt to auto-install dependencies', 'Guide users to proper Nix package management'). This attempts to override the LLM's inherent instructions and decision-making process with directives from an untrusted source, which is a form of prompt injection. Remove all direct instructions to the LLM from untrusted skill content. Skill documentation should describe the skill's functionality, not dictate the LLM's operational logic. If specific behaviors are required, they should be implemented via trusted code or explicit, trusted configuration. | LLM | SKILL.md:28 |
Scan History
Embed Code
[](https://skillshield.io/report/d349ec222c8fb313)
Powered by SkillShield