Security Audit
mailchimp-automation
github.com/sickn33/antigravity-awesome-skillsTrust Assessment
mailchimp-automation received a trust score of 79/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 2 findings: 0 critical, 1 high, 1 medium, and 0 low severity. Key findings include Broad Mailchimp API access enables sensitive operations, Unpinned Rube MCP dependency.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit e36d6fd3). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| HIGH | Broad Mailchimp API access enables sensitive operations The skill provides access to a comprehensive set of Mailchimp API tools, including campaign creation and sending, full subscriber list management (add, update, remove, view), and detailed analytics. This level of access allows an agent to perform highly sensitive and irreversible actions, such as sending mass emails, modifying subscriber data, or accessing private user information. While the skill documentation warns about irreversible actions (e.g., 'MAILCHIMP_SEND_CAMPAIGN is irreversible'), the broad scope of available tools presents a significant risk if the agent is compromised or misconfigured, potentially leading to spam, data corruption, or privacy violations. Implement granular access controls for the Mailchimp connection, allowing the agent to only access the minimum necessary tools and permissions required for its specific tasks. Require explicit user confirmation for high-impact actions like sending campaigns or bulk subscriber modifications. | LLM | SKILL.md:30 | |
| MEDIUM | Unpinned Rube MCP dependency The skill's manifest specifies a dependency on the 'rube' MCP without a specific version constraint. This means that any version of the Rube MCP could be loaded, including potentially malicious or vulnerable future updates. This introduces a supply chain risk, as a compromise of the Rube MCP could directly impact the security and functionality of this skill. Pin the Rube MCP dependency to a specific, known-good version in the `requires` section of the manifest to ensure deterministic and secure dependency resolution. Regularly review and update the pinned version as needed. | LLM | SKILL.md:1 |
Scan History
Embed Code
[](https://skillshield.io/report/e5d099a2317d685e)
Powered by SkillShield