Trust Assessment
rei received a trust score of 57/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 4 findings: 0 critical, 2 high, 2 medium, and 0 low severity. Key findings include Sensitive path access: AI agent config, Sensitive environment variable access: $HOME, Potential Command Injection via API Key argument in setup script.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Sensitive path access: AI agent config Access to AI agent config path detected: '~/.clawdbot/'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/0xreisearch/rei/SKILL.md:49 | |
| HIGH | Potential Command Injection via API Key argument in setup script The `setup.sh` script is designed to be executed by an AI agent, taking a user-provided API key as its first argument. If the agent executes this script by directly interpolating unsanitized user input into a shell command string (e.g., using `subprocess.run(..., shell=True)` in Python), a malicious API key containing shell metacharacters (e.g., `'; rm -rf /'`) could lead to arbitrary command execution on the host system. While the script uses `jq --argjson` which safely handles the API key within the JSON context, the initial parsing of the script's arguments by the shell is vulnerable if the calling agent does not properly sanitize or escape the input. The AI agent responsible for executing this script must ensure that the user-provided API key is properly sanitized or passed as a distinct argument to the script, preventing shell interpretation. For example, in Python, use `subprocess.run(['./scripts/setup.sh', user_api_key])` instead of `subprocess.run(f'./scripts/setup.sh {user_api_key}', shell=True)`. | LLM | scripts/setup.sh:10 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/0xreisearch/rei/scripts/revert.sh:7 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/0xreisearch/rei/scripts/setup.sh:8 |
Scan History
Embed Code
[](https://skillshield.io/report/c465fed7b04bbec7)
Powered by SkillShield