Trust Assessment
seo-optimizer received a trust score of 62/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 2 critical, 0 high, 0 medium, and 1 low severity. Key findings include Node lockfile missing, Arbitrary File Read via User-Controlled Path, Arbitrary File Write via User-Controlled Output Path.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 40/100, indicating areas for improvement.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Arbitrary File Read via User-Controlled Path The `seo_analyzer.py` script takes a file or directory path as a command-line argument (`sys.argv[1]`). It then uses `os.walk` to traverse the specified directory or `open()` to read the content of a specified file. If an attacker can control this input path, they could instruct the skill to read arbitrary files on the system (e.g., `/etc/passwd`, application configuration files, sensitive user data), leading to data exfiltration. Implement strict input validation and sandboxing for the `path` argument. Ensure the script can only access files within a predefined, restricted directory (e.g., the skill's own data directory or a user-specific sandbox). Avoid allowing arbitrary file system read access. | LLM | scripts/seo_analyzer.py:196 | |
| CRITICAL | Arbitrary File Write via User-Controlled Output Path The `generate_sitemap.py` script takes an optional `output_file` path as a command-line argument. If an attacker can control this path, they could instruct the skill to write an XML sitemap to an arbitrary location on the filesystem. This could lead to overwriting critical system files, injecting malicious content into web-accessible directories, or creating files in sensitive locations, potentially compromising the system or website integrity. Implement strict input validation and sandboxing for the `output_file` argument. Ensure the script can only write files within a predefined, restricted output directory (e.g., the skill's own data directory or a user-specific sandbox). Avoid allowing arbitrary file system write access. | LLM | scripts/generate_sitemap.py:190 | |
| LOW | Node lockfile missing package.json is present but no lockfile was found (package-lock.json, pnpm-lock.yaml, or yarn.lock). Commit a lockfile for deterministic dependency resolution. | Dependencies | skills/veeramanikandanr48/seo-optimizer/package.json |
Scan History
Embed Code
[](https://skillshield.io/report/c666270fae87e52b)
Powered by SkillShield