From antigravity-awesome-skills
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
npx claudepluginhub absjaded/antigravity-awesome-skillsThis skill uses the workspace's default tool permissions.
<!-- security-allowlist: curl-pipe-bash -->
Verifies tests pass on completed feature branch, presents options to merge locally, create GitHub PR, keep as-is or discard; executes choice and cleans up worktree.
Guides root cause investigation for bugs, test failures, unexpected behavior, performance issues, and build failures before proposing fixes.
Writes implementation plans from specs for multi-step tasks, mapping files and breaking into TDD bite-sized steps before coding.
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS). 2-4 sentences is perfect.
Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads.
Analyzes code for platform-specific security issues across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
sudo, chown, chmod, TakeOwnership, icacls, Set-ExecutionPolicy.touch -t, setfile (macOS), attrib (Windows), Set-ItemProperty, chflags.chmod 000, chattr +i (immutable), attrib +r +s +h, Deny ACEs in icacls.%USERPROFILE%, /Users/, or /etc/..bat, .cmd, cmd.exe /c, vbs, cscript, wscript..sh, .bash, .zsh, chmod +x followed by execution..ps1, powershell -ExecutionPolicy Bypass -File ....-WindowStyle Hidden, -w hidden, -noprofile.msiexec /qn, choco uninstall, reg delete.apt-get purge, yum remove, rm -rf /usr/bin/....brew uninstall, deleting from /Applications.adb shell, pm install, am start, apktool, dex2jar, keytool.AndroidManifest.xml (permissions), classes.dex, or strings.xml.xcodebuild, codesign, security find-identity, fastlane, xcrun.Info.plist, Entitlements.plist, or Provisioning Profiles.curl, wget, Invoke-WebRequest, Invoke-RestMethod, scp, ftp, nc, socat..env, .ssh, cookies.sqlite, Keychains (macOS), Credentials (Windows), keystore (Android).Stop-Service, taskkill /f, sc.exe delete.kill -9, pkill, systemctl disable/stop, launchctl unload.dd), firmware/BIOS calls, kernel module management.Base64, Hex, XOR loops, atob().reg add (Run keys), schtasks, crontab, launchctl (macOS), systemd units.curl ... | bash, iwr ... | iex.CATALOG.md.adb shell or sudo?Generates a security report with a score (0-10), platform target identification, flagged actions, threat analysis, and mitigation recommendations.
"Perform a security audit on this skill bundle"
"Scan for mobile threats in this AI skill"
Problem: Executing code during audit Solution: Stick to static analysis methods only
Problem: Missing cross-platform threats Solution: Check for platform-specific security issues on all supported platforms
Problem: Failing to detect obfuscated payloads Solution: Look for encoding patterns like Base64, Hex, XOR loops, and atob()
@security-scanner - Additional security scanning capabilities