Audits a Claude Code skill for security risks in three modes: before download (from a URL or install command), after download but before install (from a .skill file), or after install (from a local skills directory). Use this skill whenever a user is about to install a skill from any source — including GitHub URLs, git clone commands, npx/npm commands, curl/wget downloads, pip installs, marketplace links, or raw SKILL.md URLs. Also trigger when a user asks "is this skill safe?", "should I trust this skill?", "can you check this before I install it?", "audit this skill", or pastes any link to a skill repository or .skill file. If a user mentions installing ANY skill, proactively offer to audit it first — do not wait for them to ask.
97
97%
Does it follow best practices?
Impact
99%
1.28xAverage score across 5 eval scenarios
Advisory
Suggest reviewing before use
Eval score: 97% · Uplift: 1.28× — measured across 5 scenarios covering all three audit modes, all check categories, and prompt injection resistance.
Audits a Claude Code skill for security risks before or after you install it.
The Claude Code skills ecosystem is growing fast, and most users install skills without reading them first. Research into skills security has raised real concerns: a small number of markdown lines is all it takes for a skill to request shell access to your machine, and some skills have been found to include patterns that could exfiltrate credentials or inject instructions into Claude's behaviour. The skill-safety-auditor exists because no standard tooling existed to catch these risks before installation.
The auditor runs 14 checks across 4 categories:
Each finding is rated Critical, Warning, or Info.
skill-safety-auditor.skillclaude skills install ./skill-safety-auditor.skillInvoke the skill by telling Claude: "Audit this skill before I install it" and paste the GitHub URL, install command, or local file path. Claude will ask which mode applies:
.skill file you already have locallyClaude then runs all checks and presents a structured report with findings and remedies.
See a real audit of a real public skill: audit-sample/sample-report.md
This section runs the auditor's own checks against itself, publicly.
Frontmatter
allowed-tools: Read WebFetch GlobAll three tools are appropriate to the skill's function:
No shell access, no file write access, no credential access.
Scripts
No scripts are bundled. The references/ directory contains two markdown files — security-checks.md and report-format.md — which are documentation only. No .py, .sh, .js, or .bash files are present.
Prompt injection
The SKILL.md does not attempt to override Claude's safety behaviour, does not claim special Anthropic permissions, and does not instruct Claude to conceal anything from the user. Every instruction relates directly to the stated purpose: auditing skill files.
Source provenance
Built by mtthwmllr and published directly to this repository.
Self-audit verdict: Appears Safe.
The three tools this skill uses (Read, WebFetch, Glob) are appropriate to its function. No scripts, no credential access, no prompt injection patterns.
Found a gap in the checks, or a false positive? Open an issue at github.com/mtthwmllr/skill-safety-auditor/issues.
Pull requests welcome for new check categories or improvements to the remedy guidance.
MIT — see LICENSE
audit-sample
evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5