Trust Assessment
trello received a trust score of 93/100, placing it in the Trusted category. This skill has passed all critical security checks and demonstrates strong security practices.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Potential Command Injection via Unsanitized User Input in Shell Commands.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 18, 2026 (commit b62bd290). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Potential Command Injection via Unsanitized User Input in Shell Commands The skill provides shell command templates that directly embed placeholders for user-provided values (e.g., `{boardId}`, `Card Title`, `Your comment here`). If an orchestrating LLM or execution environment substitutes user input directly into these commands without proper sanitization or escaping, it could lead to command injection. An attacker could craft malicious input to execute arbitrary shell commands or manipulate the `curl` arguments. The LLM orchestrating this skill must ensure that all user-provided inputs interpolated into shell commands are properly quoted and escaped to prevent command injection. For example, using `printf %q` in bash or equivalent robust escaping mechanisms for each argument. The skill documentation could also explicitly warn about this and provide examples with robust quoting for user-supplied values. | Static | SKILL.md:30 |
Scan History
Embed Code
[](https://skillshield.io/report/38c738f284f7140e)
Powered by SkillShield