From agents
Audit third-party Agent Skills before install or repo promotion. Use when evaluating external skill sources, hooks, scripts, provenance, credentials, network behavior, or destructive commands. NOT for creating skills, code review, or appsec scans.
npx claudepluginhub wyattowalsh/agents --plugin agentsThis skill uses the workspace's default tool permissions.
Audit third-party Agent Skills as trust-bearing assets before installing them
Creates isolated Git worktrees for feature branches with prioritized directory selection, gitignore safety checks, auto project setup for Node/Python/Rust/Go, and baseline verification.
Executes implementation plans in current session by dispatching fresh subagents per independent task, with two-stage reviews: spec compliance then code quality.
Dispatches parallel agents to independently tackle 2+ tasks like separate test failures or subsystems without shared state or dependencies.
Audit third-party Agent Skills as trust-bearing assets before installing them globally or promoting them into this repository.
Scope: External skill import review only. NOT for creating skills
(skill-creator), normal code review (honest-review), dependency/appsec
scanning (security-scanner), or broad skill discovery (discover-skills).
$ARGUMENTS | Mode | Action |
|---|---|---|
| Empty | menu | Show audit modes, required evidence, and outcome categories |
triage <source> | triage | Classify source reputation, registry signal, install syntax, and dedupe risk |
inspect <path> | inspect | Review local staged skill files for frontmatter, hooks, scripts, and command risk |
commands <path> | commands | Extract and classify shell commands, package-manager calls, and network operations |
provenance <source> | provenance | Check source URL, owner, license, commit/hash, and registry/source-list consistency |
decision <source-or-path> | decision | Produce install-now / inspect / keep-global / build-local / avoid recommendation |
scan <path> | scan | Run the local static scanner and interpret its JSON output |
| Natural language about external skills, registries, hooks, scripts, or importing | Auto-detect the closest mode |
| Category | Meaning |
|---|---|
install now | Reputable source, clear gap, no risky executable surface after inspection |
inspect then install | Useful candidate with unresolved scripts, hooks, credentials, or provenance questions |
keep global only | Useful personally, but duplicate or too operational for repo promotion |
build locally | Concept is valuable but external options are weak, stale, or too broad |
avoid/duplicate | Unsafe, untrusted, source-conflicted, stale, or redundant with repo skills |
Use these canonical terms exactly in audit reports.
| Term | Meaning |
|---|---|
| source-list | Read-only npx skills add <source> --list result used before install |
| executable surface | Hook, script, command substitution, shell snippet, binary, or package script |
| source conflict | Registry metadata and source-list/install behavior disagree |
| provenance | Source owner, URL, license, commit, content hash, and access date |
| credential behavior | How a skill reads, stores, transmits, or asks for secrets and tokens |
| promotion | Moving an external skill into this repo's tracked catalog or docs |
| outcome category | One of install now, inspect then install, keep global only, build locally, or avoid/duplicate |
Classify the request before auditing:
skill-creator.honest-review.security-scanner.discover-skills.npx skills add <source> --list
SKILL.md and all referenced files before installing.For local staged skill directories, run:
uv run python skills/external-skill-auditor/scripts/audit_external_skill.py <skill-dir>
Treat the script output as a first-pass signal only. Human review still decides whether commands are intentional, documented, and acceptable for the skill's purpose.
SKILL.md for routing, outcome categories, and hard rules.references/import-checklist.md when making any install, promotion, or avoid decision.scripts/audit_external_skill.py only for local staged skill directories.Use references/import-checklist.md for the full gate. Minimum checks:
hooks, allowed-tools, scripts, and executable files.npx skills add <source> --list evidence before any install decision.| File | Read When |
|---|---|
references/import-checklist.md | Running any audit, decision, or repo-promotion review |
| Script | Run When |
|---|---|
scripts/audit_external_skill.py | Static first-pass scan of a local external skill directory |
## External Skill Audit
- Candidate:
- Source:
- Intended install command:
- Outcome:
- Confidence:
- Trust blockers:
### Evidence
- Source/provenance:
- Registry/source-list:
- Dedupe:
- Executable surfaces:
- Credential/network behavior:
- Script scan:
### Required Follow-up
- ...
Before declaring this skill complete after edits:
uv run wagents validate
uv run wagents eval validate
uv run python audit.py skills/external-skill-auditor
uv run wagents package external-skill-auditor --dry-run
uv run python skills/external-skill-auditor/scripts/audit_external_skill.py skills/external-skill-auditor
Completion criteria: