Security Audit
azure-security-keyvault-secrets-java
github.com/sickn33/antigravity-awesome-skillsTrust Assessment
azure-security-keyvault-secrets-java received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 0 high, 0 medium, and 2 low severity. Key findings include Partial Secret Value Printed to Console, Filesystem Write/Read Capability Demonstrated.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit e36d6fd3). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| LOW | Partial Secret Value Printed to Console The skill demonstrates printing the first 5 characters of a retrieved secret to standard output. While truncated, printing any portion of a secret to console can lead to sensitive data exposure through logs or console output, which is generally a security anti-pattern. Avoid printing any part of secret values to standard output or logs. If debugging requires inspecting secret values, use secure debugging tools or mask the output entirely. For production, ensure secrets are handled only in memory or securely passed to consuming services. | LLM | SKILL.md:120 | |
| LOW | Filesystem Write/Read Capability Demonstrated The skill demonstrates backup and restore operations that involve writing and reading secret backup data to/from the local filesystem using `Files.write` and `Files.readAllBytes`. This indicates the skill, or the agent executing it, requires and utilizes filesystem access. While the example uses a hardcoded path, this capability could be considered excessive for some skill contexts and, if the path were user-controlled, could lead to data exfiltration or command injection vulnerabilities. Evaluate if filesystem access is strictly necessary for the skill's core functionality. If so, ensure that any file paths are strictly controlled and not derived from untrusted input. Implement robust input validation and restrict file operations to designated secure directories. Consider alternative secure storage mechanisms if local filesystem access is not critical. | LLM | SKILL.md:196 |
Scan History
Embed Code
[](https://skillshield.io/report/0894be7a596bdee4)
Powered by SkillShield