Trust Assessment
socket-gen received a trust score of 74/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 0 critical, 2 high, 0 medium, and 0 low severity. Key findings include Unpinned external dependency execution via npx, Potential credential harvesting via external npx tool.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Unpinned external dependency execution via npx The skill recommends executing an external `npx` package (`ai-socket`) without specifying a version. This introduces a significant supply chain risk, as a malicious update to the `ai-socket` package could lead to arbitrary code execution on the user's system when the command is run. Users are implicitly trusting the integrity of the `ai-socket` package and its maintainers. Pin the `npx` package to a specific, known-good version (e.g., `npx ai-socket@1.0.0`) to mitigate risks from future malicious updates. Additionally, consider providing a mechanism for users to verify the package's integrity (e.g., checksums). | LLM | SKILL.md:10 | |
| HIGH | Potential credential harvesting via external npx tool The skill instructs the user to run an external `npx` package (`ai-socket`) which explicitly requires the `OPENAI_API_KEY` environment variable. If the `ai-socket` package is compromised (as per the supply chain risk identified), it could exfiltrate this sensitive API key, leading to unauthorized access to the user's OpenAI account and potential financial or data loss. Advise users to exercise extreme caution when running external tools that require sensitive environment variables. If possible, provide a sandboxed environment or a method to pass credentials securely without exposing them globally to potentially untrusted code. | LLM | SKILL.md:47 |
Scan History
Embed Code
[](https://skillshield.io/report/6b7bfff2c3db4f8d)
Powered by SkillShield