Trust Assessment
planning-with-files received a trust score of 71/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 0 critical, 2 high, 0 medium, and 0 low severity. Key findings include Dangerous tool allowed: Bash, Command Injection in init-session.sh via PROJECT_NAME.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Dangerous tool allowed: Bash The skill allows the 'Bash' tool without constraints. This grants arbitrary command execution. Remove unconstrained shell/exec tools from allowed-tools, or add specific command constraints. | Static | skills/othmanadi/planning-with-files/SKILL.md:1 | |
| HIGH | Command Injection in init-session.sh via PROJECT_NAME The `scripts/init-session.sh` script is vulnerable to command injection. The `PROJECT_NAME` variable, which is derived from the first command-line argument (`$1`), is used unsanitized within an `echo` command. If an attacker can control the first argument passed to this script (e.g., by instructing the AI agent to use the `Bash` tool with a malicious argument), they can inject and execute arbitrary shell commands. The skill declares the `Bash` permission, making this a credible exploit path. Sanitize or properly quote the `PROJECT_NAME` variable when used in `echo` or other commands. For Bash, consider using `printf "Initializing planning files for: %s\n" "$PROJECT_NAME"` or, if Bash 4.4+ is available, `echo "Initializing planning files for: ${PROJECT_NAME@Q}"`. | LLM | scripts/init-session.sh:8 |
Scan History
Embed Code
[](https://skillshield.io/report/bd864cea803bfc29)
Powered by SkillShield