扫描报告
5 /100
command-guardian
Preflight safety guard for shell and infrastructure commands
Command Guardian is a legitimate preflight safety analyzer for shell commands. It performs read-only risk analysis and does not execute analyzed commands or exhibit any malicious behavior.
可以安装
This skill is safe for use. The dangerous shell patterns (curl|sh, wget|bash) referenced in documentation are documented as dangerous patterns TO FLAG, not patterns the skill performs itself.
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ | READ | ✓ 一致 | agents/openai.yaml declares filesystem:READ |
| 命令执行 | WRITE | WRITE | ✓ 一致 | guardlib.py:294-297 uses subprocess for git commands only |
| 环境变量 | NONE | READ | ✓ 一致 | guardlib.py:76 uses os.path.expandenv() for path resolution only |
| 网络访问 | NONE | NONE | — | No network calls found |
| 技能调用 | NONE | NONE | — | No skill invocation found |
| 剪贴板 | NONE | NONE | — | No clipboard access found |
| 浏览器 | NONE | NONE | — | No browser access found |
| 数据库 | NONE | NONE | — | No database access found |
2 严重 2 项发现
严重 危险命令 危险 Shell 命令
curl | sh SKILL.md:54 严重 危险命令 危险 Shell 命令
wget | bash references/tool-patterns.md:30 目录结构
11 文件 · 45.5 KB · 1208 行 Python 7f · 1007L
Markdown 3f · 193L
YAML 1f · 8L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
references
│ ├─
risk-rules.md
Markdown
│ └─
tool-patterns.md
Markdown
├─
▾
scripts
│ ├─
classify_command.py
Python
│ ├─
guardlib.py
Python
│ ├─
path_guard.py
Python
│ ├─
preflight.py
Python
│ ├─
rollback_hints.py
Python
│ └─
secret_guard.py
⚠
Python
├─
▾
tests
│ └─
test_powershell_risk.py
Python
└─
SKILL.md
Markdown
安全亮点
✓ Skill performs read-only command analysis without executing analyzed commands
✓ Subprocess usage limited to git context (git rev-parse, git status) - legitimate for security tooling
✓ No credential harvesting or exfiltration - only detects inline secrets to warn about them
✓ No network requests or data exfiltration channels
✓ No obfuscation techniques (no base64, no eval, no atob)
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No persistence mechanisms (no cron, no startup hooks, no backdoors)
✓ Capabilities properly declared in agents/openai.yaml
✓ Comprehensive test suite validates expected security behaviors
✓ Dangerous patterns (curl|sh, wget|bash) are documented AS PATTERNS TO FLAG, not as behaviors exhibited