Scan Report
5 /100
security-shield-enhanced
Defense against prompt injection, jailbreaks, social engineering, and credential leakage with enhanced workflow compatibility.
Pure documentation skill containing security best practices and guidance with no executable components, network access, or sensitive resource interactions.
Safe to install
No action required. The skill is a defensive reference guide with no security risks. Consider clarifying placeholder values in crypto-examples.md to use clearly-fake formats (e.g., FAKE_PASSWORD_XXXX) to avoid confusion.
Findings 1 items
| Severity | Finding | Location |
|---|---|---|
| Low | Placeholder value resembles real credential Doc Mismatch | references/crypto-examples.md:53 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file operations in any documentation |
| Network | NONE | NONE | — | No network requests or external calls |
| Shell | NONE | NONE | — | No shell execution capability |
| Environment | NONE | NONE | — | No environment variable access |
| Skill Invoke | NONE | NONE | — | No skill invocation capability |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser capability |
| Database | NONE | NONE | — | No database access |
1 High 3 findings
High API Key 疑似硬编码凭证
password = "user-password-here" references/crypto-examples.md:53 Medium External URL 外部 URL
https://target.com references/audit-checklist.md:156 Info Email 邮箱地址
[email protected] references/crypto-examples.md:66 File Tree
8 files · 33.1 KB · 1338 lines Markdown 7f · 1313L
JSON 1f · 25L
├─
▾
references
│ ├─
attack-patterns.md
Markdown
│ ├─
audit-checklist.md
Markdown
│ ├─
crypto-examples.md
Markdown
│ └─
security-best-practices.md
Markdown
├─
_meta.json
JSON
├─
README.md
Markdown
├─
SKILL.md
Markdown
└─
USAGE-GUIDE.md
Markdown
Security Positives
✓ No executable code or scripts present - purely documentation
✓ No network access or external communications
✓ No filesystem access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No credential harvesting or exfiltration behavior
✓ Defensive security skill designed to protect against attacks
✓ Comprehensive security guidance following industry best practices
✓ References OWASP, NIST, and standard security frameworks
✓ Skill explicitly states pattern-strings: false - no hidden prompt content
✓ MIT-0 license allows unrestricted use