Trust Assessment
submit-limit-order received a trust score of 84/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 3 findings: 0 critical, 0 high, 3 medium, and 0 low severity. Key findings include Missing required field: name, Unjustified `Glob` tool permission, Potentially excessive `Grep` tool permission.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 14, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Missing required field: name The 'name' field is required for claude_code skills but is missing from frontmatter. Add a 'name' field to the SKILL.md frontmatter. | Static | skills/wpank/submit-limit-order/SKILL.md:1 | |
| MEDIUM | Unjustified `Glob` tool permission The skill declares the `Glob` tool in its `allowed-tools` manifest. The `Glob` tool allows for broad filesystem pattern matching. The skill's described workflow, which involves submitting a UniswapX order and validating inputs (e.g., checking a token allowlist), does not present a clear or necessary use case for general filesystem globbing capabilities. Granting such a broad permission increases the attack surface for information disclosure or reconnaissance, exceeding the principle of least privilege. Remove the `Glob` tool from the `allowed-tools` list if its functionality is not strictly required for the skill's operation. If a specific file lookup is needed, consider using `Read` with a constrained path instead of broad filesystem access. | LLM | SKILL.md:1 | |
| MEDIUM | Potentially excessive `Grep` tool permission The skill declares the `Grep` tool in its `allowed-tools` manifest. The `Grep` tool allows for searching content within files across the filesystem. While the skill's workflow mentions "Check token allowlist", which might involve reading a configuration file, granting a general `Grep` permission could allow for searching sensitive information beyond the scope of the allowlist. It is preferable to use more narrowly scoped tools or specific file `Read` operations if only a particular file's content needs to be checked, adhering to the principle of least privilege. If `Grep` is used solely for checking an allowlist, consider replacing it with a more specific tool or a `Read` operation on a known, constrained file path. If `Grep` is truly needed, ensure its usage is strictly limited to non-sensitive files and paths. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/db63ede58d34f719)
Powered by SkillShield