Trust Assessment
paraswap received a trust score of 79/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Sensitive environment variable access: $USER, Unsanitized user input in shell command JSON payloads.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Unsanitized user input in shell command JSON payloads The skill's `SKILL.md` demonstrates `curl` commands that construct JSON payloads by directly interpolating shell variables (e.g., `USER_ADDRESS`, `SRC_TOKEN`, `DEST_TOKEN`, `AMOUNT`, `PRICE_ROUTE`, `TOKEN_ADDRESS`, `signature`). If these variables are populated from untrusted user input without proper sanitization (e.g., escaping shell metacharacters or JSON-breaking characters), an attacker could inject arbitrary shell commands or malform the JSON payload, leading to command injection or unintended API behavior. The `PRICE_ROUTE` variable is particularly vulnerable as it's inserted directly as a JSON object, and the `signature` field in the 'Limit Orders' example is also directly interpolated. The `expiry` field in 'Limit Orders' explicitly uses shell command substitution, highlighting the execution context. All user-provided inputs used in shell commands or JSON payloads must be rigorously sanitized and escaped. For JSON string values, ensure that double quotes and backslashes are properly escaped. For JSON object/array values (like `PRICE_ROUTE`), ensure the input is valid JSON and does not contain shell metacharacters if it's being interpolated into a shell command. Consider using a dedicated JSON library or a more robust templating mechanism instead of direct string concatenation in shell commands for sensitive data. | LLM | SKILL.md:69 | |
| MEDIUM | Sensitive environment variable access: $USER Access to sensitive environment variable '$USER' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/0xterrybit/paraswap/SKILL.md:85 |
Scan History
Embed Code
[](https://skillshield.io/report/4347780cce95418d)
Powered by SkillShield