Trust Assessment
proactive-research received a trust score of 10/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 9 findings: 5 critical, 3 high, 1 medium, and 0 low severity. Key findings include Persistence / self-modification instructions, Arbitrary command execution, Dangerous call: subprocess.run().
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 0/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings9
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Persistence / self-modification instructions Crontab manipulation (list/remove/edit) Remove any persistence mechanisms. Skills should not modify system startup configurations, crontabs, LaunchAgents, systemd services, or shell profiles. | Manifest | skills/robbyczgw-cla/proactive-research/scripts/setup_cron.py:146 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/robbyczgw-cla/proactive-research/scripts/monitor.py:72 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/robbyczgw-cla/proactive-research/scripts/setup_cron.py:27 | |
| CRITICAL | Arbitrary command execution Python shell execution (os.system, subprocess) Review all shell execution calls. Ensure commands are static (not built from user input), use absolute paths, and are strictly necessary. Prefer library APIs over shell commands. | Manifest | skills/robbyczgw-cla/proactive-research/scripts/setup_cron.py:39 | |
| CRITICAL | Command Injection via Cron Job Configuration The `scripts/setup_cron.py` script constructs cron job entries using user-controlled values from `config.json` (specifically `digest_day` and `digest_time`). These values are directly interpolated into a shell command string that is then passed to the `crontab` utility. A malicious user could inject shell metacharacters into `digest_day` or `digest_time` in `config.json` (e.g., `digest_time: "00:00; evil_command"`), leading to arbitrary command execution when the cron job is installed or executed. Sanitize user-provided `digest_day` and `digest_time` values to ensure they only contain valid cron schedule components (e.g., digits, colons, valid day names) and no shell metacharacters. Alternatively, use a dedicated cron management library that handles argument escaping safely, or pass the command arguments as a list to `subprocess.run` if possible, rather than constructing a single shell command string. | LLM | scripts/setup_cron.py:96 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'search_topic'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/robbyczgw-cla/proactive-research/scripts/monitor.py:72 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'set_crontab'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/robbyczgw-cla/proactive-research/scripts/setup_cron.py:39 | |
| HIGH | Dangerous call: subprocess.run() Call to 'subprocess.run()' detected in function 'get_current_crontab'. This can execute arbitrary code. Avoid using dangerous functions like exec/eval/os.system. Use safer alternatives. | Static | skills/robbyczgw-cla/proactive-research/scripts/setup_cron.py:27 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/robbyczgw-cla/proactive-research/scripts/monitor.py:203 |
Scan History
Embed Code
[](https://skillshield.io/report/d40852645013c7c2)
Powered by SkillShield