CtrlK
BlogDocsLog inGet started
Tessl Logo

mtthwmllr/skill-safety-auditor

Audits a Claude Code skill for security risks in three modes: before download (from a URL or install command), after download but before install (from a .skill file), or after install (from a local skills directory). Use this skill whenever a user is about to install a skill from any source — including GitHub URLs, git clone commands, npx/npm commands, curl/wget downloads, pip installs, marketplace links, or raw SKILL.md URLs. Also trigger when a user asks "is this skill safe?", "should I trust this skill?", "can you check this before I install it?", "audit this skill", or pastes any link to a skill repository or .skill file. If a user mentions installing ANY skill, proactively offer to audit it first — do not wait for them to ask.

97

1.28x
Quality

97%

Does it follow best practices?

Impact

99%

1.28x

Average score across 5 eval scenarios

SecuritybySnyk

Advisory

Suggest reviewing before use

Overview
Quality
Evals
Security
Files

README.md

skill-safety-auditor

tessl

Eval score: 97% · Uplift: 1.28× — measured across 5 scenarios covering all three audit modes, all check categories, and prompt injection resistance.

Audits a Claude Code skill for security risks before or after you install it.


Why this exists

The Claude Code skills ecosystem is growing fast, and most users install skills without reading them first. Research into skills security has raised real concerns: a small number of markdown lines is all it takes for a skill to request shell access to your machine, and some skills have been found to include patterns that could exfiltrate credentials or inject instructions into Claude's behaviour. The skill-safety-auditor exists because no standard tooling existed to catch these risks before installation.


What it checks

The auditor runs 14 checks across 4 categories:

  • Frontmatter — declared tool access, missing permissions fields, overly broad tool lists
  • Script Content — credential access, outbound network calls, obfuscation, persistent system modifications
  • Prompt Injection — safety override instructions, false permission claims, instructions to conceal behaviour
  • Source Provenance — anonymous maintainers, brand-new repositories, description/content mismatches

Each finding is rated Critical, Warning, or Info.


Install

  1. Download skill-safety-auditor.skill
  2. In your terminal, run:
    claude skills install ./skill-safety-auditor.skill
  3. That's it. The skill is now available in Claude Code.

How to use it

Invoke the skill by telling Claude: "Audit this skill before I install it" and paste the GitHub URL, install command, or local file path. Claude will ask which mode applies:

  • Mode 1 — Pre-download — fetches the skill from a URL or install command before anything touches your machine
  • Mode 2 — Downloaded, not installed — reads a .skill file you already have locally
  • Mode 3 — Already installed — reads the live files from your Claude Code skills directory

Claude then runs all checks and presents a structured report with findings and remedies.


Sample output

See a real audit of a real public skill: audit-sample/sample-report.md


Is this skill itself safe?

This section runs the auditor's own checks against itself, publicly.

Frontmatter

allowed-tools: Read WebFetch Glob

All three tools are appropriate to the skill's function:

  • Read — reads local skill files in Modes 2 and 3
  • WebFetch — fetches remote SKILL.md content in Mode 1
  • Glob — finds bundled scripts in the skill directory

No shell access, no file write access, no credential access.

Scripts

No scripts are bundled. The references/ directory contains two markdown files — security-checks.md and report-format.md — which are documentation only. No .py, .sh, .js, or .bash files are present.

Prompt injection

The SKILL.md does not attempt to override Claude's safety behaviour, does not claim special Anthropic permissions, and does not instruct Claude to conceal anything from the user. Every instruction relates directly to the stated purpose: auditing skill files.

Source provenance

Built by mtthwmllr and published directly to this repository.

Self-audit verdict: Appears Safe.

The three tools this skill uses (Read, WebFetch, Glob) are appropriate to its function. No scripts, no credential access, no prompt injection patterns.


Contributing / issues

Found a gap in the checks, or a false positive? Open an issue at github.com/mtthwmllr/skill-safety-auditor/issues.

Pull requests welcome for new check categories or improvements to the remedy guidance.


Licence

MIT — see LICENSE

CHANGELOG.md

index.html

package-lock.json

package.json

privacy.html

README.md

robots.txt

SKILL.md

tessl.json

tile.json

vercel.json