Security Audit
slack-automation
github.com/sickn33/antigravity-awesome-skillsTrust Assessment
slack-automation received a trust score of 85/100, placing it in the Mostly Trusted category. This skill has passed most security checks with only minor considerations noted.
SkillShield's automated analysis identified 1 finding: 0 critical, 0 high, 1 medium, and 0 low severity. Key findings include Skill enables broad Slack workspace access.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. All layers scored 70 or above, reflecting consistent security practices.
Last analyzed on February 20, 2026 (commit e36d6fd3). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings1
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| MEDIUM | Skill enables broad Slack workspace access The `slack-automation` skill, as described in `SKILL.md`, provides access to a wide range of Slack operations including sending, editing, and searching messages, listing all channels and users, managing reactions, and scheduling messages. This comprehensive toolset implies that the underlying Slack integration (via Rube MCP) would require extensive OAuth scopes (e.g., `chat:write`, `channels:read`, `users:read`, `search:read`, `reactions:write`, `im:write`, `mpim:write`, `groups:read`, `team:read`, `chat:schedule`). While necessary for full automation, such broad access, if granted to an AI agent without strict controls, could lead to significant data exposure, unauthorized communication, or manipulation of the Slack workspace. Review the necessity of each Slack tool for the agent's specific tasks. Implement granular OAuth scopes where possible, granting only the minimum required permissions. Ensure the agent's operational context includes robust guardrails and human oversight for sensitive Slack operations. Consider breaking down the skill into smaller, more specialized skills with narrower permission sets. | LLM | SKILL.md:29 |
Scan History
Embed Code
[](https://skillshield.io/report/39087981b6b983ca)
Powered by SkillShield