Trust Assessment
test-driven-development received a trust score of 86/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via `cargo test`.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 12, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via `cargo test` The skill explicitly instructs the LLM to execute the shell command `cargo test --no-run -p <crate>`. If the `<crate>` parameter is derived directly from untrusted user input without proper sanitization or validation, an attacker could inject arbitrary shell commands. For example, if a user provides input that results in `<crate>` being `my_crate; rm -rf /`, the `rm -rf /` command would be executed on the host system. Implement strict input validation and sanitization for any parameters derived from user input, such as the `<crate>` name. Ensure that shell metacharacters are properly escaped or disallowed. Consider using programmatic APIs for interacting with build tools instead of direct shell execution where possible, or use a safe command execution library that handles argument escaping. | LLM | SKILL.md:30 |
Scan History
Embed Code
[](https://skillshield.io/report/051129150e145d60)
Powered by SkillShield