Trust Assessment
vikunja-fast received a trust score of 71/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 0 critical, 2 high, 0 medium, and 0 low severity. Key findings include Sensitive path access: AI agent config, Command Injection via unsanitized `task_id` in API calls.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Sensitive path access: AI agent config Access to AI agent config path detected: '~/.clawdbot/'. This may indicate credential theft. Verify that access to this sensitive path is justified and declared. | Static | skills/tmigone/vikunja-fast/SKILL.md:27 | |
| HIGH | Command Injection via unsanitized `task_id` in API calls The `task_id` argument, provided by the user to the `show` and `done` commands, is directly interpolated into the URL path for `curl` API calls within the `api_get` and `api_post_json` functions. This allows for command injection if `task_id` contains shell metacharacters (e.g., `123; rm -rf /`), leading to arbitrary command execution on the host system. For example, executing `vikunja.sh show '123; echo pwned'` would attempt to execute `echo pwned`. Validate `task_id` to ensure it is a positive integer before use. If non-numeric characters are expected, URL-encode the `task_id` using a function like `urlencode` (already present in the script) before passing it to `api_get` or `api_post_json`. For example, `local encoded_task_id=$(printf %s "$task_id" | urlencode); api_get "/tasks/$encoded_task_id"`. | LLM | vikunja.sh:138 |
Scan History
Embed Code
[](https://skillshield.io/report/5ebfb6773b380221)
Powered by SkillShield