skill-scanner
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill's reference file
references/prompt-injection-patterns.mdcontains numerous examples of prompt injection techniques (e.g., 'ignore all previous instructions', 'DAN mode', 'developer mode'). These are documented solely to help the agent identify these threats in target skills being audited and do not represent an attempt to subvert the agent's own instructions. - [REMOTE_CODE_EXECUTION]:
references/dangerous-code-patterns.mdincludes examples of reverse shells, netcat backdoors, and the use ofeval()orexec()for running untrusted code. These snippets are presented as detection targets for the auditing workflow and are not intended for execution by the skill itself. - [COMMAND_EXECUTION]: The skill uses the
Bashtool to run its bundled Python analysis scriptscripts/scan_skill.pyvia theuvpackage manager. This is a legitimate and justified use of the tool for the skill's primary function of automated security scanning. - [DATA_EXFILTRATION]: Reference documentation includes examples of exfiltrating data via HTTP, DNS, and file-based methods to illustrate what the auditor should look for in malicious skills. No such behavior is present in the skill's operational code.
- [EXTERNAL_DOWNLOADS]: The skill references the
uvinstallation guide onastral.sh. This is a well-known service for Python development tooling and is considered a safe source for configuration and dependency management. - [SAFE]: The Python script
scripts/scan_skill.pyuses standard libraries andpyyaml'ssafe_load()function, following security best practices. All flagged static analysis patterns are part of the detection logic designed to find vulnerabilities in other code.
Audit Metadata