Trust Assessment
cloudformation-to-pulumi received a trust score of 70/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 1 finding: 1 critical, 0 high, 0 medium, and 0 low severity. Key findings include Potential Command Injection via AWS CLI arguments.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on April 1, 2026 (commit bbf441e6). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Potential Command Injection via AWS CLI arguments The skill instructs the agent to execute AWS CLI commands (`aws cloudformation get-template`, `aws cloudformation list-stack-resources`) using user-provided values for `--region` and `--stack-name`. If these user inputs are directly interpolated into shell commands without proper sanitization or escaping, a malicious user could inject arbitrary shell commands. For example, a stack name like `my-stack; rm -rf /` could lead to severe system compromise. The agent implementing this skill must ensure that all user-provided inputs (e.g., region, stack name) used in shell commands are rigorously sanitized and escaped. Prefer using a dedicated AWS SDK or a secure command execution library that handles argument separation safely, rather than direct string interpolation into a shell command. | Static | SKILL.md:60 |
Scan History
Embed Code
[](https://skillshield.io/report/0ed0a7c4d90c4a31)
Powered by SkillShield