Security Audit
azure-storage-file-datalake-py
github.com/sickn33/antigravity-awesome-skillsTrust Assessment
azure-storage-file-datalake-py received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 0 medium, and 0 low severity. Key findings include Skill requires local filesystem read/write access.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit e36d6fd3). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| INFO | Skill requires local filesystem read/write access The skill's core functionality involves reading data from the local filesystem for upload (`open("local-file.txt", "rb")`) and writing downloaded data to the local filesystem (`open("downloaded.txt", "wb")`). While this is necessary for its intended purpose of interacting with Azure Data Lake Storage, it means the skill will require appropriate filesystem permissions from the host environment. If the host grants overly broad access, this capability could be misused if the skill's input is compromised or if the skill itself were malicious. The host environment should implement strict sandboxing and granular filesystem access controls for skills. Ensure the skill only has access to necessary directories or temporary storage, and not arbitrary paths on the host system. | LLM | SKILL.md:100 |
Scan History
Embed Code
[](https://skillshield.io/report/6af0e3553161e19e)
Powered by SkillShield