From antigravity-awesome-skills
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
npx claudepluginhub mit-network/antigravity-awesome-skillsThis skill uses the workspace's default tool permissions.
<!-- security-allowlist: curl-pipe-bash -->
Mandates invoking relevant skills via tools before any response in coding sessions. Covers access, priorities, and adaptations for Claude Code, Copilot CLI, Gemini CLI.
Share bugs, ideas, or general feedback.
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS). 2-4 sentences is perfect.
Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads.
Analyzes code for platform-specific security issues across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
sudo, chown, chmod, TakeOwnership, icacls, Set-ExecutionPolicy.touch -t, setfile (macOS), attrib (Windows), Set-ItemProperty, chflags.chmod 000, chattr +i (immutable), attrib +r +s +h, Deny ACEs in icacls.%USERPROFILE%, /Users/, or /etc/..bat, .cmd, cmd.exe /c, vbs, cscript, wscript..sh, .bash, .zsh, chmod +x followed by execution..ps1, powershell -ExecutionPolicy Bypass -File ....-WindowStyle Hidden, -w hidden, -noprofile.msiexec /qn, choco uninstall, reg delete.apt-get purge, yum remove, rm -rf /usr/bin/....brew uninstall, deleting from /Applications.adb shell, pm install, am start, apktool, dex2jar, keytool.AndroidManifest.xml (permissions), classes.dex, or strings.xml.xcodebuild, codesign, security find-identity, fastlane, xcrun.Info.plist, Entitlements.plist, or Provisioning Profiles.curl, wget, Invoke-WebRequest, Invoke-RestMethod, scp, ftp, nc, socat..env, .ssh, cookies.sqlite, Keychains (macOS), Credentials (Windows), keystore (Android).Stop-Service, taskkill /f, sc.exe delete.kill -9, pkill, systemctl disable/stop, launchctl unload.dd), firmware/BIOS calls, kernel module management.Base64, Hex, XOR loops, atob().reg add (Run keys), schtasks, crontab, launchctl (macOS), systemd units.curl ... | bash, iwr ... | iex.CATALOG.md.adb shell or sudo?Generates a security report with a score (0-10), platform target identification, flagged actions, threat analysis, and mitigation recommendations.
"Perform a security audit on this skill bundle"
"Scan for mobile threats in this AI skill"
Problem: Executing code during audit Solution: Stick to static analysis methods only
Problem: Missing cross-platform threats Solution: Check for platform-specific security issues on all supported platforms
Problem: Failing to detect obfuscated payloads Solution: Look for encoding patterns like Base64, Hex, XOR loops, and atob()
@security-scanner - Additional security scanning capabilities