Trust Assessment
session-cost received a trust score of 95/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Arbitrary File Read via User-Controlled Path.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Arbitrary File Read via User-Controlled Path The `session-cost.js` script accepts a `--path` argument, allowing it to scan and read `.jsonl` files from any directory on the filesystem that the Node.js process has access to. The `findJsonlFiles` function recursively traverses directories. While the script's parsing logic is designed to extract specific fields (session ID, model, provider, usage metrics) from `.jsonl` files, an attacker who can control the `--path` argument could potentially direct the script to read `.jsonl` files from sensitive locations. If these files contain sensitive information within the extracted fields (e.g., a sensitive session ID, API name, or provider name), this could lead to data exfiltration. The script does not perform any sanitization or validation on the provided path beyond checking for `.jsonl` extension. Implement strict validation and sanitization for the `--path` argument. Restrict the allowed directories to a predefined set or ensure paths are relative to a secure base directory. If arbitrary paths are necessary, ensure that the script's output is thoroughly sanitized and that no sensitive data from unexpected `.jsonl` files can be inadvertently exfiltrated. Consider adding a `--no-recursive` flag or limiting recursion depth for `findJsonlFiles` to reduce the attack surface. | LLM | scripts/session-cost.js:20 |
Scan History
Embed Code
[](https://skillshield.io/report/6a7864abe667b57d)
Powered by SkillShield