Trust Assessment
permission-auditor received a trust score of 94/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Unpinned `npx` command poses supply chain risk.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Unpinned `npx` command poses supply chain risk The skill's 'Quick Start' and 'Usage Examples' sections recommend using `npx ai-permission` without specifying a version. This practice means that the latest available version of the `ai-permission` package will always be downloaded and executed. If the package maintainer's account is compromised or a malicious version is published to the npm registry, users following this instruction could inadvertently execute arbitrary malicious code. It is best practice to pin dependencies to a specific version to ensure reproducibility and mitigate risks from unexpected or malicious updates. Specify a version for `npx` commands (e.g., `npx ai-permission@1.0.0 src/routes/`) or recommend installing it globally with a pinned version (`npm install -g ai-permission@1.0.0`) to ensure a consistent and secure execution environment. | LLM | SKILL.md:11 |
Scan History
Embed Code
[](https://skillshield.io/report/a728ebfdfac2ffb6)
Powered by SkillShield