Scan Report
18 /100
claude-code-framework
Claude Code Framework - A defensive execution framework providing permission checks, context budget monitoring, and lifecycle hooks for AI agents
A defensive security framework providing permission checks, context budget management, and lifecycle hooks. No malicious behavior detected; code matches documented functionality.
Safe to install
This skill is safe to use. Monitor the 'leaked source code' branding claim for accuracy. No changes needed.
Findings 2 items
| Severity | Finding | Location |
|---|---|---|
| Low | Questionable source attribution Doc Mismatch | SKILL.md:1 |
| Info | Config file flagged as sensitive Sensitive Access | config.json:1 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | NONE | — | No file operations in code |
| Network | NONE | NONE | — | No network calls in code |
| Shell | NONE | NONE | — | No subprocess/exec calls |
| Environment | NONE | NONE | — | No os.environ access |
| Skill Invoke | NONE | NONE | — | No skill invocation |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database operations |
File Tree
6 files · 32.0 KB · 1269 lines TypeScript 4f · 926L
Markdown 1f · 263L
JSON 1f · 80L
├─
config.json
⚠
JSON
├─
context-budget.ts
TypeScript
├─
handler.ts
TypeScript
├─
hook-manager.ts
TypeScript
├─
risk-classifier.ts
TypeScript
└─
SKILL.md
Markdown
Security Positives
✓ No credential harvesting or environment variable enumeration
✓ No network calls or external data exfiltration
✓ No shell execution (subprocess, exec, eval)
✓ No obfuscation techniques (base64, atob, eval patterns)
✓ No sensitive file access (~/.ssh, ~/.aws, .env)
✓ No remote script execution (curl|bash, wget|sh)
✓ Defensive security controls properly implemented (permission checks, risk classification, hook system)
✓ Code is clean and follows TypeScript best practices