Trust Assessment
solvr received a trust score of 59/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 4 findings: 0 critical, 2 high, 2 medium, and 0 low severity. Key findings include Sensitive environment variable access: $HOME, Unencoded user input in URL parameters leading to command injection, Unencoded user input in URL path and parameters leading to command injection.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings4
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Unencoded user input in URL parameters leading to command injection The `cmd_search` and `cmd_get` functions construct API request URLs by directly interpolating user-supplied variables (`type_filter`, `post_id`, `include`) without proper URL encoding. An attacker could inject arbitrary URL parameters or path segments, potentially manipulating API requests or exploiting vulnerabilities in the `curl` command or the remote API. Ensure all user-supplied input used in URL paths or query parameters is properly URL-encoded before being passed to `curl`. Implement a robust `urlencode` function and apply it to `type_filter`, `post_id`, and `include` variables. For example, `endpoint="${endpoint}&type=$(urlencode "$type_filter")"`. | LLM | scripts/solvr.sh:100 | |
| HIGH | Unencoded user input in URL path and parameters leading to command injection The `cmd_get` function constructs API request URLs by directly interpolating user-supplied variables (`post_id`, `include`) without proper URL encoding. An attacker could inject arbitrary URL path segments or query parameters, potentially manipulating API requests or exploiting vulnerabilities in the `curl` command or the remote API. Ensure all user-supplied input used in URL paths or query parameters is properly URL-encoded before being passed to `curl`. Implement a robust `urlencode` function and apply it to `post_id` and `include` variables. For example, `local endpoint="/posts/$(urlencode "$post_id")"` and `endpoint="${endpoint}?include=$(urlencode "$include")"`. | LLM | scripts/solvr.sh:145 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/fcavalcantirj/solvr/scripts/solvr.sh:11 | |
| MEDIUM | Sensitive environment variable access: $HOME Access to sensitive environment variable '$HOME' detected in shell context. Verify this environment variable access is necessary and the value is not exfiltrated. | Static | skills/fcavalcantirj/solvr/scripts/test.sh:168 |
Scan History
Embed Code
[](https://skillshield.io/report/d78ec16a4a0d7b95)
Powered by SkillShield