Trust Assessment
polymarket received a trust score of 74/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 0 critical, 2 high, 0 medium, and 0 low severity. Key findings include Command Injection via Unsanitized URL Parameters, Command Injection via Unsanitized URL Parameters (Portfolio Tracker).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Command Injection via Unsanitized URL Parameters The skill provides bash script examples that construct `curl` commands by directly interpolating variables (e.g., `MARKET_SLUG`, `SLUG`) into the URL query string without proper sanitization or URL encoding. If these variables originate from untrusted user input, an attacker could inject shell metacharacters (e.g., `$(command)`, `;`, `|`) to execute arbitrary commands on the host system. The 'Price Alert Script' explicitly uses `MARKET_SLUG="your-market-slug"`, indicating a placeholder for dynamic input, making this a credible exploit path if the LLM were to generate and execute such a script based on user-provided input. Ensure all variables interpolated into shell commands, especially URLs, are properly sanitized and URL-encoded. For bash, consider using `printf %q` for shell arguments or a dedicated `urlencode` function for URL parameters before constructing the `curl` command. For example, `MARKET_SLUG_ENCODED=$(python -c 'import urllib.parse; print(urllib.parse.quote("$MARKET_SLUG"))')` and then use `curl ...slug=$MARKET_SLUG_ENCODED`. | LLM | SKILL.md:300 | |
| HIGH | Command Injection via Unsanitized URL Parameters (Portfolio Tracker) Similar to the 'Price Alert Script', the 'Portfolio Tracker' script constructs `curl` commands by directly interpolating the `$SLUG` variable into the URL query string. Although the `POSITIONS` array is hardcoded in this specific example, the pattern of using `$SLUG` without sanitization creates a vulnerability if `$SLUG` were to be derived from untrusted input in a real-world scenario. An attacker could inject shell metacharacters to execute arbitrary commands. Ensure all variables interpolated into shell commands, especially URLs, are properly sanitized and URL-encoded. For bash, consider using `printf %q` for shell arguments or a dedicated `urlencode` function for URL parameters before constructing the `curl` command. For example, `SLUG_ENCODED=$(python -c 'import urllib.parse; print(urllib.parse.quote("$SLUG"))')` and then use `curl ...slug=$SLUG_ENCODED`. | LLM | SKILL.md:330 |
Scan History
Embed Code
[](https://skillshield.io/report/12821e8cde22955c)
Powered by SkillShield