Trusted — Risk Score 5/100
Last scan:22 hr ago Rescan
5 /100
project-bootstrap
Bootstrap a multi-agent software project from idea to running CI/CD
A legitimate project-bootstrap skill with a clean taskboard CLI. All behavior is declared, scoped, and uses only standard library. No malicious indicators found.
Skill Nameproject-bootstrap
Duration31.2s
Enginepi
Safe to install
No action needed. Skill is safe for deployment.
ResourceDeclaredInferredStatusEvidence
Filesystem NONE WRITE ✓ Aligned scripts/taskboard.py:68 - open(self.path, 'w') and open(self.cache_file, 'w')
Network NONE READ ✓ Aligned scripts/taskboard.py:97-106 - GitHub API calls via urllib for task sync
Environment NONE READ ✓ Aligned scripts/taskboard.py:93 - os.environ.get(config.get('token_env', 'GITHUB_TOKEN')…
Shell NONE NONE No subprocess, os.system, or shell invocation found
Skill Invoke NONE NONE No dynamic skill invocation or meta-programming detected
Clipboard NONE NONE No clipboard access
Browser NONE NONE No browser automation
Database NONE NONE No database access
1 findings
🔗
Medium External URL 外部 URL
https://discord.com/api/webhooks/
references/ci-cd-templates.md:127

File Tree

4 files · 31.1 KB · 988 lines
Markdown 3f · 497L Python 1f · 491L
├─ 📁 references
│ ├─ 📝 ci-cd-templates.md Markdown 175L · 4.3 KB
│ └─ 📝 taskboard-setup.md Markdown 141L · 3.4 KB
├─ 📁 scripts
│ └─ 🐍 taskboard.py Python 491L · 18.1 KB
└─ 📝 SKILL.md Markdown 181L · 5.2 KB

Security Positives

✓ Uses only Python standard library — no third-party dependencies, no supply chain risk
✓ GitHub token access is purpose-limited to GitHub API calls only (urlopen to api.github.com), not exfiltrated
✓ No subprocess, os.system, shell invocation, or any dynamic code execution
✓ No base64, obfuscation, eval, or anti-analysis patterns
✓ Local backend is read-only to the user's workspace unless explicitly configured
✓ File writes are scoped to user-specified JSON files directly related to the taskboard feature
✓ References/ci-cd-templates.md includes a Discord webhook URL but only in documentation context, not in any executable code
✓ The entire codebase is readable, straightforward CLI logic — no hidden functionality
✓ No sensitive paths (~/.ssh, ~/.aws, .env) are accessed
✓ No persistence mechanisms (cron, startup hooks, systemd units)