Trust Assessment
qrdex received a trust score of 64/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 0 critical, 2 high, 1 medium, and 0 low severity. Key findings include Unsafe deserialization / dynamic eval, Suspicious import: requests, Arbitrary file write vulnerability in image download.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Unsafe deserialization / dynamic eval Python variable indirection to hide dangerous calls Remove obfuscated code execution patterns. Legitimate code does not need base64-encoded payloads executed via eval, encrypted-then-executed blobs, or dynamic attribute resolution to call system functions. | Manifest | skills/sebastienb/qrdex/scripts/qrdex_api.py:26 | |
| HIGH | Arbitrary file write vulnerability in image download The `cmd_image` function in `scripts/qrdex_api.py` allows a user to specify an arbitrary output file path via the `-o` or `--output` argument. The script directly uses this user-provided path in `open(out, 'wb')`, which can lead to writing data to any location on the filesystem accessible by the script's execution context. A malicious actor could exploit this to overwrite critical system files, write to sensitive directories, or cause a denial of service by filling up disk space. Implement robust path validation and sanitization for the output file argument. Restrict file writes to a designated safe directory (e.g., the current working directory or a temporary directory) and prevent path traversal characters (e.g., `..`, `/` in unexpected positions). Consider prompting the user for confirmation if the path is outside expected boundaries or if it's an absolute path. | LLM | scripts/qrdex_api.py:118 | |
| MEDIUM | Suspicious import: requests Import of 'requests' detected. This module provides network or low-level system access. Verify this import is necessary. Network and system modules in skill code may indicate data exfiltration. | Static | skills/sebastienb/qrdex/scripts/qrdex_api.py:9 |
Scan History
Embed Code
[](https://skillshield.io/report/60663086f75b7637)
Powered by SkillShield