security-auditor

Proactively audit agent skills (SKILL.md and bundled scripts) for security risks including malicious installers, obfuscated payloads, credential exfiltration, and supply-chain attacks. Use when installing, reviewing, or triaging any agent skill, or when the user asks to check a skill for safety.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "security-auditor" with this command: npx skills add seekaxis/skills/seekaxis-skills-security-auditor

Skill Security Auditor

Overview

Scans agent skill directories for dangerous patterns that could compromise a developer's machine. Skills are markdown-driven instruction sets that agents follow — and markdown is effectively an installer in agent ecosystems. This auditor catches threats before they execute.

When to Trigger

  • A new skill is being installed or considered for installation
  • The user asks to review a skill for safety or security
  • A skill directory is opened or browsed for the first time
  • Before running any bundled scripts from a skill
  • During periodic audits of installed skills

Quick Start

Run the scanner against any skill directory:

node scripts/scan.js <path-to-skill-directory>

Output: JSON report to stdout + human summary to stderr.

Exit codes: 0 = pass, 1 = findings (Critical/High), 2 = scanner error.

Scan all installed skills

node scripts/scan.js --all <skills-root-directory>

What It Detects

IDThreatSeverityExample
CURL_PIPEOne-liner curl/wget piped to shellCriticalcurl … | sh
BASE64_EXECBase64-decoded content piped to shell/evalCriticalecho … | base64 -d | bash
QUARANTINE_RMmacOS Gatekeeper quarantine removalCriticalxattr -d com.apple.quarantine
BINARY_EXECDownload-and-execute binary chainsCriticalchmod +x ./bin && ./bin
SECRET_ACCESSReads SSH keys, keychains, credentialsCriticalcat ~/.ssh/id_rsa
EVAL_EXECeval/exec of untrusted stringsHigheval($(curl …))
POSTINSTALLPackage manager postinstall hooks with commandsHigh"postinstall": "curl …"
SUSPICIOUS_LINKLinks to shorteners, paste sites, unknown hostsHighhttps://bit.ly/…
DEPENDENCY_REDIRDependencies from tarballs or unknown registriesHighnpm install https://…tgz
PATH_MODIFYModifies shell startup files or PATHMedium>> ~/.zshrc
ENCODED_BLOBLarge base64/hex blobs embedded in filesMedium1000+ char base64 block
BUNDLED_BINARYCompiled binaries shipped in skill directoryMedium.exe, .dylib, .so files

Interpreting Results

Severity Levels

  • Critical — Immediate stop. Remote code execution or credential exfiltration likely. Do NOT install.
  • High — Likely dangerous. Requires manual review before proceeding.
  • Medium — Context-sensitive risk. Review the specific line and decide.
  • Low — Informational hardening suggestion.

Report Schema

Each finding:

{
  "rule_id": "CURL_PIPE",
  "severity": "Critical",
  "file": "SKILL.md",
  "line": 42,
  "excerpt": "curl -fsSL https://example.com/install.sh | sh",
  "pattern_matched": "curl.*\\|.*(sh|bash|zsh)",
  "remediation": "Download the script separately, inspect it, then run in a sandbox.",
  "confidence": "high"
}

Triage Workflow

  1. Run scanner → review report
  2. For each Critical finding: reject the skill unless you can verify provenance
  3. For each High finding: inspect the matched line, check if the URL/command is from a known publisher
  4. For Medium findings: use judgment — mark as false positive with annotation if benign
  5. Log triage decisions for audit trail

Allowlists

Edit scripts/rules.jsonallowlists section to whitelist:

  • Trusted domains (e.g., github.com, npmjs.com, pypi.org)
  • Known safe patterns in your org's skills

Running Tests

node --test tests/scan.test.js

CI Integration

Add to your pipeline:

node scripts/scan.js --all ./skills --json > audit-report.json
# Exit 1 on Critical/High → fails the build

Additional Resources

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

claude-code-cli

No summary provided by upstream source.

Repository SourceNeeds Review
Security

Skill Safe Install

L0 级技能安全安装流程。触发“安装技能/安全安装/审查权限”时,强制执行 Step0-5(查重→检索→审查→沙箱→正式安装→白名单)。

Registry SourceRecently Updated
0370
Profile unavailable
Security

Skill Hunter

Find, evaluate, and install ClawHub skills. Semantic search across 10,000+ skills, security vetting before install, side-by-side comparison. The skill that m...

Registry SourceRecently Updated
2503
Profile unavailable