Trust Assessment
youbaolian received a trust score of 88/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 1 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via Environment Variable Interpolation in Shell Commands.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 13, 2026 (commit 13146e6a). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Potential Command Injection via Environment Variable Interpolation in Shell Commands The skill's documentation demonstrates the use of `curl` and `jq` commands where environment variables (`$YBL_URL`, `$YBL_ENCRYPTION`) are directly interpolated into the shell command string. For example, the `export TB_TOKEN` command constructs a `curl` request using these variables. If these environment variables can be controlled by an attacker (e.g., through malicious configuration or if the skill itself constructs these from untrusted input), shell metacharacters within these variables could lead to arbitrary command execution. The manifest explicitly lists `curl` and `jq` as required binaries and `YBL_URL`, `YBL_ENCRYPTION` as required environment variables, indicating that such commands are central to the skill's intended operation. 1. **Input Validation and Sanitization:** Ensure that the values of `YBL_URL` and `YBL_ENCRYPTION` are strictly validated and sanitized to prevent the inclusion of shell metacharacters before being used in shell commands. 2. **Safe Shell Execution:** If shell execution is necessary, use a method that properly quotes or escapes arguments, such as `printf %q` in bash, or use a dedicated library function that handles argument passing safely (e.g., `subprocess.run` with `shell=False` and passing arguments as a list in Python). 3. **Avoid Direct Shell Interpolation:** Prefer using HTTP client libraries in a programming language (e.g., Python, Node.js) that handle URL and data encoding securely, rather than constructing `curl` commands via string concatenation. 4. **Least Privilege:** Ensure that the environment where these commands are executed has minimal necessary permissions. | LLM | SKILL.md:20 |
Scan History
Embed Code
[](https://skillshield.io/report/3f61c40fd3352d37)
Powered by SkillShield