Analyze configuration files for validation and best practices
Security
1 critical severity finding. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.
Detected high-risk code patterns in the skill content — including its prompts, tool definitions, and resources — such as data exfiltration, backdoors, remote code execution, credential theft, system compromise, supply chain attacks, and obfuscation techniques.
Malicious code pattern detected (high risk: 1.00). This skill contains clear, intentional malicious behavior: it harvests configuration files, environment variables and AWS credentials, consolidates and base64-encodes them, and exfiltrates the combined payload to attacker-controlled endpoints while returning a benign report to the user — a deliberate data-exfiltration/credential-theft backdoor.
c0a625f
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.