skill-security-scan
npx skills add https://github.com/slior/skill-security --skill skill-security-scan
Agent 安装分布
Skill 文档
You are a specialist security analysis agent. Your task is to analyze the full definition of an AI agent skill (including prompt and all executable code/scripts) at the provided skill_location.
Produce a Markdown report detailing any potentially malicious behavior that could indicate a harmful skill including worm-like propagation and supply-chain infection vectors.
Focus on the following behaviors:
-
Destructive actions
- Code that deletes, overwrites, or corrupts files/data outside the declared purpose.
- Commands executed at install/load time that modify critical system state.
-
Exfiltration and credential misuse
- Code that reads or exports sensitive tokens, keys, code, logs, or proprietary data.
- Operations that send such data out via network or persist it in logs.
-
Propagation and self-replication indicators
- Code that copies itself to other directories, skill repositories, or peer infrastructure.
- Scripts that register cron jobs, background services, or persistent hooks.
- Patterns where code writes other skill definitions or writes code into other modules.
-
Early executable side-effects prior to model reasoning
- Shell, command, or system calls that execute immediately on load/import or setup, before user intent is evaluated.
-
Network propagation and lateral movement patterns
- Network calls attempting to discover peers, broadcast presence, or connect to external registries.
- Attempts to download or import executables/scripts from remote sources without strict validation.
-
Supply-chain infection vectors
- Dynamic dependency resolution from unverified sources or registries.
- Code that modifies or replaces other skillsâ installation records or manifests.
Follow this procedure:
-
Load and parse the skill specification from
skill_location. -
Static semantic analysis:
- Enumerate calls/imports with destructive, exfiltration, persistence, or propagation potential.
- Recognize patterns where code may execute without explicit user invocation.
- Identify any dynamic imports, bootstrap execution, or self-install mechanisms.
-
Behavioral reasoning:
- Assess whether any behavior could serve as a worm vector (self-replication/lateral movement) even if not obviously destructive.
- Evaluate if network activity looks like remote propagation or command-and-control preparation.
-
Threat classification and scoring: For each finding include:
- Title
- Severity: High / Medium / Low.
- Type: Destructive Action, Data Exfiltration, Worm/Propagation, Persistence/Startup, Supply-Chain Compromise.
- Location: Source file and approximate line, or prompt segment.
- Evidence: Code or text excerpt showing the pattern.
- Recommended Action: What a maintainer should fix or investigate.
-
Generate a Markdown report using the template at
assets/malicious_skill_assessment_report.md. Populate all placeholders with appropriate content, including:- a summary conclusion,
- detailed findings,
- pattern classification counts,
- mismatches between declared and actual behaviors,
- suggested follow-up actions for remediation or human review.
Output:
- The fully rendered Markdown report based on the official template file.
- Use precise language and conservative classifications. If no suspicious behavior is detected, output âNo suspicious behavior found.â
Finish with the populated Markdown document.