From antigravity-awesome-skills
Audits AI skills and bundles for malicious patterns, data leaks, system stability risks, and obfuscated payloads using non-intrusive static analysis across Windows, macOS, Linux/Unix, and Android/iOS.
npx claudepluginhub sickn33/antigravity-awesome-skillsThis skill uses the workspace's default tool permissions.
<!-- security-allowlist: curl-pipe-bash -->
Performs 6-phase security audit on third-party AI agent skills before installation, scanning for malicious patterns, script risks, permissions, social engineering, and repo credibility. Use prior to adding skills from GitHub or registries.
Scans SKILL.md files for security issues including prompt injection, malicious scripts, excessive permissions, secret exposure, and supply chain risks using Python static analyzer and Bash workflows.
Evaluates security and safety of agent skills from GitHub repos, websites, or files. Detects prompt injections, malicious code, hidden instructions, data exfiltration with risk scores and recommendations.
Share bugs, ideas, or general feedback.
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS). 2-4 sentences is perfect.
Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads.
Analyzes code for platform-specific security issues across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
sudo, chown, chmod, TakeOwnership, icacls, Set-ExecutionPolicy.touch -t, setfile (macOS), attrib (Windows), Set-ItemProperty, chflags.chmod 000, chattr +i (immutable), attrib +r +s +h, Deny ACEs in icacls.%USERPROFILE%, /Users/, or /etc/..bat, .cmd, cmd.exe /c, vbs, cscript, wscript..sh, .bash, .zsh, chmod +x followed by execution..ps1, powershell -ExecutionPolicy Bypass -File ....-WindowStyle Hidden, -w hidden, -noprofile.msiexec /qn, choco uninstall, reg delete.apt-get purge, yum remove, rm -rf /usr/bin/....brew uninstall, deleting from /Applications.adb shell, pm install, am start, apktool, dex2jar, keytool.AndroidManifest.xml (permissions), classes.dex, or strings.xml.xcodebuild, codesign, security find-identity, fastlane, xcrun.Info.plist, Entitlements.plist, or Provisioning Profiles.curl, wget, Invoke-WebRequest, Invoke-RestMethod, scp, ftp, nc, socat..env, .ssh, cookies.sqlite, Keychains (macOS), Credentials (Windows), keystore (Android).Stop-Service, taskkill /f, sc.exe delete.kill -9, pkill, systemctl disable/stop, launchctl unload.dd), firmware/BIOS calls, kernel module management.Base64, Hex, XOR loops, atob().reg add (Run keys), schtasks, crontab, launchctl (macOS), systemd units.curl ... | bash, iwr ... | iex.CATALOG.md.adb shell or sudo?Generates a security report with a score (0-10), platform target identification, flagged actions, threat analysis, and mitigation recommendations.
"Perform a security audit on this skill bundle"
"Scan for mobile threats in this AI skill"
Problem: Executing code during audit Solution: Stick to static analysis methods only
Problem: Missing cross-platform threats Solution: Check for platform-specific security issues on all supported platforms
Problem: Failing to detect obfuscated payloads Solution: Look for encoding patterns like Base64, Hex, XOR loops, and atob()
@security-scanner - Additional security scanning capabilities