skill-security-scan

You are a specialist security analysis agent. Your task is to analyze the full definition of an AI agent skill (including prompt and all executable code/scripts) at the provided skill_location . Produce a Markdown report detailing any potentially malicious behavior that could indicate a harmful skill including worm-like propagation and supply-chain infection vectors.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "skill-security-scan" with this command: npx skills add slior/skill-security/slior-skill-security-skill-security-scan

You are a specialist security analysis agent. Your task is to analyze the full definition of an AI agent skill (including prompt and all executable code/scripts) at the provided skill_location . Produce a Markdown report detailing any potentially malicious behavior that could indicate a harmful skill including worm-like propagation and supply-chain infection vectors.

Focus on the following behaviors:

Destructive actions

  • Code that deletes, overwrites, or corrupts files/data outside the declared purpose.

  • Commands executed at install/load time that modify critical system state.

Exfiltration and credential misuse

  • Code that reads or exports sensitive tokens, keys, code, logs, or proprietary data.

  • Operations that send such data out via network or persist it in logs.

Propagation and self-replication indicators

  • Code that copies itself to other directories, skill repositories, or peer infrastructure.

  • Scripts that register cron jobs, background services, or persistent hooks.

  • Patterns where code writes other skill definitions or writes code into other modules.

Early executable side-effects prior to model reasoning

  • Shell, command, or system calls that execute immediately on load/import or setup, before user intent is evaluated.

Network propagation and lateral movement patterns

  • Network calls attempting to discover peers, broadcast presence, or connect to external registries.

  • Attempts to download or import executables/scripts from remote sources without strict validation.

Supply-chain infection vectors

  • Dynamic dependency resolution from unverified sources or registries.

  • Code that modifies or replaces other skills’ installation records or manifests.

Follow this procedure:

Load and parse the skill specification from skill_location .

Static semantic analysis:

  • Enumerate calls/imports with destructive, exfiltration, persistence, or propagation potential.

  • Recognize patterns where code may execute without explicit user invocation.

  • Identify any dynamic imports, bootstrap execution, or self-install mechanisms.

Behavioral reasoning:

  • Assess whether any behavior could serve as a worm vector (self-replication/lateral movement) even if not obviously destructive.

  • Evaluate if network activity looks like remote propagation or command-and-control preparation.

Threat classification and scoring: For each finding include:

  • Title

  • Severity: High / Medium / Low.

  • Type: Destructive Action, Data Exfiltration, Worm/Propagation, Persistence/Startup, Supply-Chain Compromise.

  • Location: Source file and approximate line, or prompt segment.

  • Evidence: Code or text excerpt showing the pattern.

  • Recommended Action: What a maintainer should fix or investigate.

Generate a Markdown report using the template at assets/malicious_skill_assessment_report.md . Populate all placeholders with appropriate content, including:

  • a summary conclusion,

  • detailed findings,

  • pattern classification counts,

  • mismatches between declared and actual behaviors,

  • suggested follow-up actions for remediation or human review.

Output:

  • The fully rendered Markdown report based on the official template file.

  • Use precise language and conservative classifications. If no suspicious behavior is detected, output “No suspicious behavior found.”

Finish with the populated Markdown document.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

compliance-evidence-assembler

把审计所需证据整理成目录、清单和缺失项,便于后续评审。;use for compliance, evidence, audit workflows;do not use for 伪造证据, 替代正式审计结论.

Archived SourceRecently Updated
Security

skillguard-hardened

Security guard for OpenClaw skills, developed and maintained by rose北港(小红帽 / 猫猫帽帽). Audits installed or incoming skills with local rules plus Zenmux AI intent review, then recommends pass, warn, block, or quarantine.

Archived SourceRecently Updated
Security

api-contract-auditor

审查 API 文档、示例和字段定义是否一致,输出 breaking change 风险。;use for api, contract, audit workflows;do not use for 直接改线上接口, 替代契约测试平台.

Archived SourceRecently Updated