Trust Assessment
secret-portal received a trust score of 12/100, placing it in the Untrusted category. This skill has significant security findings that require attention before use in production.
SkillShield's automated analysis identified 5 findings: 2 critical, 1 high, 2 medium, and 0 low severity. Key findings include File read + network send exfiltration, Sensitive path access: Environment file, Auto-download and execution of external binary (`cloudflared`).
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The Manifest Analysis layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings5
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | File read + network send exfiltration .env file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/awlevin/secret-portal/SKILL.md:18 | |
| CRITICAL | File read + network send exfiltration .env file access Remove access to sensitive files not required by the skill's stated purpose. SSH keys, cloud credentials, and browser data should never be read by skills unless explicitly part of their declared functionality. | Manifest | skills/awlevin/secret-portal/SKILL.md:35 | |
| HIGH | Auto-download and execution of external binary (`cloudflared`) The skill description explicitly states that `cloudflared` is "auto-downloads the binary if missing." This means the `secret-portal` application, invoked by this skill, will fetch and execute an external binary from the internet without explicit user intervention for the download. This introduces a significant supply chain risk. If the download source or the integrity of the `cloudflared` binary is compromised, the skill could download and execute arbitrary malicious code, leading to command injection, data exfiltration, or full system compromise. The `secret-portal` application should implement robust integrity checks (e.g., cryptographic hash verification) for any downloaded binaries. Alternatively, require `cloudflared` to be pre-installed by the user or the skill environment, removing the auto-download functionality. | LLM | SKILL.md:49 | |
| MEDIUM | Sensitive path access: Environment file Access to Environment file path detected: '~/.env'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/awlevin/secret-portal/SKILL.md:18 | |
| MEDIUM | Sensitive path access: Environment file Access to Environment file path detected: '~/.env'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/awlevin/secret-portal/SKILL.md:35 |
Scan History
Embed Code
[](https://skillshield.io/report/e7aa2594da994eb6)
Powered by SkillShield