Trust Assessment
tick-md received a trust score of 74/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 3 findings: 0 critical, 1 high, 2 medium, and 0 low severity. Key findings include Missing required field: name, Potential Command Injection via Unsanitized User Input, Unpinned External Dependencies.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings3
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Unsanitized User Input The skill demonstrates constructing shell commands (e.g., `tick add`, `tick comment`, `tick edit`) by directly embedding user-provided strings (such as task titles, comments, or edit values) without explicit sanitization or escaping. If the agent directly interpolates untrusted user input into these shell commands, a malicious user could inject arbitrary shell commands. For example, a task title like `"; rm -rf /; "` could lead to critical system compromise if not properly escaped before execution. Implement robust input sanitization and shell escaping for all user-provided strings before they are used in shell commands. For example, use a library that safely escapes arguments for the target shell, or pass arguments as a list to `subprocess.run` (or equivalent) instead of a single string. | LLM | SKILL.md:59 | |
| MEDIUM | Missing required field: name The 'name' field is required for openclaw skills but is missing from frontmatter. Add a 'name' field to the SKILL.md frontmatter. | Static | skills/gianni-dalerta/tick-md/SKILL.md:1 | |
| MEDIUM | Unpinned External Dependencies The `skill.json` manifest lists external packages (`tick-md`, `tick-mcp-server`) without specifying exact versions. This can lead to supply chain vulnerabilities if a malicious update is published to these packages, as the system would automatically install the latest compatible version. It is recommended to pin dependencies to specific versions (e.g., `tick-md@1.2.1`) or at least to major/minor versions (`tick-md@^1.2.0`) and use a lock file to ensure deterministic and secure builds. Pin all external dependencies to exact versions in `skill.json` to ensure deterministic builds and prevent unexpected malicious updates. | LLM | skill.json:20 |
Scan History
Embed Code
[](https://skillshield.io/report/7b757204d35d351a)
Powered by SkillShield