Launch and navigate the ccboard TUI/Web dashboard for Claude Code. Use when monitoring token usage, tracking costs, browsing sessions, or checking MCP server status across projects.
70
63%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Optimize this skill with Tessl
npx tessl skill review --optimize ./examples/skills/ccboard/SKILL.mdSecurity
2 findings — 1 high severity, 1 medium severity. You should review these findings carefully before considering using this skill.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). The prompt explicitly describes showing "full command and arguments" and "environment variables with values" from MCP/server configs and Claude directories, which would require the agent to read and output secret tokens or API keys verbatim.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The skill's install instructions/scripts invoke remote installers (e.g., "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh") and also reference cloning the repository (https://github.com/{OWNER}/ccboard), which fetch and execute remote code as part of setup and are required to obtain the Rust/cargo toolchain and source, so they constitute runtime external code execution risk.
746adc8
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.