Automate Addresszen tasks via Rube MCP (Composio). Always search tools first for current schemas.
69
53%
Does it follow best practices?
Impact
97%
4.84xAverage score across 3 eval scenarios
Advisory
Suggest reviewing before use
Optimize this skill with Tessl
npx tessl skill review --optimize ./composio-skills/addresszen-automation/SKILL.mdSecurity
2 findings — 2 medium severity. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The skill explicitly instructs the agent to call RUBE_SEARCH_TOOLS against the Rube MCP endpoint (e.g., https://rube.app/mcp) to fetch tool schemas and recommended execution plans which the agent must read and use to determine tool slugs and arguments, exposing it to arbitrary third-party content that could embed instructions.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The Rube MCP endpoint https://rube.app/mcp is explicitly required at runtime (used by RUBE_SEARCH_TOOLS / RUBE_MANAGE_CONNECTIONS / RUBE_MULTI_EXECUTE_TOOL) and returns tool schemas and execution plans that directly control which prompts/tools the agent uses and how it executes actions.
2790447
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.