LLM Function Calling
Enables LLMs to execute functions for structured outputs and integrate with external systems, enhancing interaction capabilities.
Install this skill
or
30/100
Security score
The LLM Function Calling skill was audited on Feb 12, 2026 and we found 6 security issues across 1 threat category, including 4 high-severity. Review the findings below before installing.
Categories Tested
Security Issues
high line 1118
Direct command execution function call
SourceSKILL.md
| 1118 | dangerous_commands = ["eval(", "exec(", "system(", "__import__"] |
high line 1338
Direct command execution function call
SourceSKILL.md
| 1338 | dangerous_keywords = ["import os", "import subprocess", "exec(", "eval("] |
high line 1118
Eval function call - arbitrary code execution
SourceSKILL.md
| 1118 | dangerous_commands = ["eval(", "exec(", "system(", "__import__"] |
high line 1338
Eval function call - arbitrary code execution
SourceSKILL.md
| 1338 | dangerous_keywords = ["import os", "import subprocess", "exec(", "eval("] |
medium line 1118
System command execution
SourceSKILL.md
| 1118 | dangerous_commands = ["eval(", "exec(", "system(", "__import__"] |
medium line 1349
Python subprocess execution
SourceSKILL.md
| 1349 | result = subprocess.run( |
Scanned on Feb 12, 2026
View Security DashboardGitHub Stars 106
Rate this skill
Categorydevelopment
UpdatedMay 21, 2026
majiayu000/claude-skill-registry