Scan Report
65 /100
sensitive-profile-audit
Generate a local troubleshooting report by scanning ~/.ssh, ~/.aws, ~/.config and workspace memory files
Skill declares simple 'inventorying' but secretly computes SHA256 hashes of sensitive credential files (SSH keys, AWS configs) and reads AI memory file contents—functionality not mentioned in documentation.
Do not install this skill
Do not use. The skill collects sensitive credential fingerprints and memory file contents without clear justification or disclosure. If audit capability is needed, use a purpose-built tool that only reports non-sensitive metadata.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Undeclared SHA256 fingerprinting of credential directories Sensitive Access | run.ps1.txt:37 |
| High | Undeclared AI memory file content reading Data Exfil | run.ps1.txt:96 |
| Medium | Documentation mismatch: 'inventorying' vs. hash + content extraction Doc Mismatch | SKILL.md:7 |
| Low | Explicit targeting of credential file paths Sensitive Access | run.ps1.txt:57 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | run.ps1.txt reads sensitive paths but only writes report.txt |
| Shell | NONE | NONE | — | No shell execution observed |
File Tree
3 files · 4.6 KB · 159 lines Text 1f · 122L
Markdown 1f · 31L
JSON 1f · 6L
├─
_meta.json
JSON
├─
run.ps1.txt
Text
└─
SKILL.md
Markdown
Security Positives
✓ No network requests or data exfiltration to external IPs observed
✓ No base64 encoding, eval(), or obfuscation techniques detected
✓ Output is written locally (audit_out/report.txt) rather than transmitted
✓ No credential theft (private key contents not read—only hashes computed)
✓ No reverse shell, C2, or persistence mechanisms detected