Scan Report
5 /100
project-bootstrap
Bootstrap a multi-agent software project from idea to running CI/CD
A legitimate project-bootstrap skill with a clean taskboard CLI. All behavior is declared, scoped, and uses only standard library. No malicious indicators found.
Safe to install
No action needed. Skill is safe for deployment.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✓ Aligned | scripts/taskboard.py:68 - open(self.path, 'w') and open(self.cache_file, 'w') |
| Network | NONE | READ | ✓ Aligned | scripts/taskboard.py:97-106 - GitHub API calls via urllib for task sync |
| Environment | NONE | READ | ✓ Aligned | scripts/taskboard.py:93 - os.environ.get(config.get('token_env', 'GITHUB_TOKEN')… |
| Shell | NONE | NONE | — | No subprocess, os.system, or shell invocation found |
| Skill Invoke | NONE | NONE | — | No dynamic skill invocation or meta-programming detected |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database access |
1 findings
Medium External URL 外部 URL
https://discord.com/api/webhooks/ references/ci-cd-templates.md:127 File Tree
4 files · 31.1 KB · 988 lines Markdown 3f · 497L
Python 1f · 491L
├─
▾
references
│ ├─
ci-cd-templates.md
Markdown
│ └─
taskboard-setup.md
Markdown
├─
▾
scripts
│ └─
taskboard.py
Python
└─
SKILL.md
Markdown
Security Positives
✓ Uses only Python standard library — no third-party dependencies, no supply chain risk
✓ GitHub token access is purpose-limited to GitHub API calls only (urlopen to api.github.com), not exfiltrated
✓ No subprocess, os.system, shell invocation, or any dynamic code execution
✓ No base64, obfuscation, eval, or anti-analysis patterns
✓ Local backend is read-only to the user's workspace unless explicitly configured
✓ File writes are scoped to user-specified JSON files directly related to the taskboard feature
✓ References/ci-cd-templates.md includes a Discord webhook URL but only in documentation context, not in any executable code
✓ The entire codebase is readable, straightforward CLI logic — no hidden functionality
✓ No sensitive paths (~/.ssh, ~/.aws, .env) are accessed
✓ No persistence mechanisms (cron, startup hooks, systemd units)