Scan Report
5 /100
intelligent-memory-trigger-system
Intelligent system that automatically determines when to create workflow documentation based on task complexity, repetition patterns, and user intent.
This skill is purely documentation-based with no executable code, scripts, or actual capabilities. It contains only Markdown files describing a workflow decision-making system with JavaScript pseudocode examples.
Safe to install
No immediate action needed. The skill is safe to use as it contains no executable components. However, consider adding explicit allowed-tools declaration to SKILL.md for clarity.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | No allowed-tools declaration Doc Mismatch | SKILL.md:1 |
| Low | Hardcoded user paths in documentation Doc Mismatch | memory-trigger-management.md:120 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file operations in skill code |
| Network | NONE | NONE | — | No network calls in skill |
| Shell | NONE | NONE | — | No shell execution in skill |
| Environment | NONE | NONE | — | No environment access in skill |
| Skill Invoke | NONE | NONE | — | No skill invocation patterns found |
| Clipboard | NONE | NONE | — | No clipboard access in skill |
| Browser | NONE | NONE | — | No browser access in skill |
| Database | NONE | NONE | — | No database access in skill |
File Tree
4 files · 33.1 KB · 999 lines Markdown 4f · 999L
├─
memory-trigger-management.md
Markdown
├─
SKILL.md
Markdown
├─
trigger-logic.md
Markdown
└─
usage-guide.md
Markdown
Security Positives
✓ No executable scripts or code files present in the skill
✓ No network requests or external communications detected
✓ No credential harvesting or sensitive data access
✓ No obfuscation techniques or suspicious encoding patterns
✓ No supply chain dependencies that could introduce vulnerabilities
✓ No persistence mechanisms or backdoors detected
✓ No prompt injection attempts or hidden instructions found
✓ Skill is purely documentation with pseudocode examples - no actual execution capability