Trust Assessment
spend-pulse received a trust score of 82/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Potential Command Injection via Output Path, Unpinned Dependency in Installation Instructions.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Output Path The `spend-pulse chart` command allows specifying an arbitrary output path using the `-o <path>` argument. If an AI agent allows user-controlled input to be passed directly as this `<path>` argument without proper sanitization or validation, it could lead to command injection. An attacker could provide a malicious path (e.g., `'; rm -rf /'`) to execute arbitrary shell commands on the host system. The AI agent should strictly sanitize and validate any user-provided input intended for file paths. Consider restricting output paths to a predefined, sandboxed directory or using a robust path sanitization library to prevent directory traversal and command injection. Avoid directly concatenating user input into shell commands. | LLM | SKILL.md:105 | |
| MEDIUM | Unpinned Dependency in Installation Instructions The installation instructions for `spend-pulse` use `npm install -g spend-pulse` without specifying a version. This means the latest available version from the npm registry will be installed. If the `spend-pulse` package on npm is compromised (e.g., malicious code injected into a new version) or a typosquatting attack occurs, the installed skill could contain malicious code, posing a supply chain risk. Pin the version of the npm package in the installation instructions (e.g., `npm install -g spend-pulse@1.2.3`) to ensure deterministic and secure installations. Implement package integrity checks (e.g., using `npm ci` with a `package-lock.json` or verifying package hashes) where possible. | LLM | SKILL.md:17 |
Scan History
Embed Code
[](https://skillshield.io/report/29431d50ebd70a14)
Powered by SkillShield