CtrlK
BlogDocsLog inGet started
Tessl Logo

design-review

Designer's eye QA: finds visual inconsistency, spacing issues, hierarchy problems, AI slop patterns, and slow interactions — then fixes them. Iteratively fixes issues in source code, committing each fix atomically and re-verifying with before/after screenshots. For plan-mode design review (before implementation), use /plan-design-review. Use when asked to "audit the design", "visual QA", "check if it looks good", or "design polish". Proactively suggest when the user mentions visual inconsistencies or wants to polish the look of a live site. (gstack)

Invalid
This skill can't be scored yet
Validation errors are blocking scoring. Review and fix them to unlock Quality, Impact and Security scores. See what needs fixing →
SKILL.md
Quality
Evals
Security

Security

3 findings — 1 critical severity, 2 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.

Critical

E004: Prompt injection detected in skill instructions

What this means

Detected a prompt injection in the skill instructions. The skill contains hidden or deceptive instructions that fall outside its stated purpose and attempt to override the agent’s safety guidelines or intended behavior.

Why it was flagged

Potential prompt injection detected (high risk: 0.80). The prompt contains many explicit but out-of-scope operational directives (telemetry logging/remote telemetry, gbrain session sync/publishing, auto-upgrade flows, writing/committing project-wide files like CLAUDE.md, vendoring migration, and broad config changes) that are not required for a design-review and can mutate the user's environment or push data off-machine — this is a hidden/deceptive-behavior risk even though the instructions are visible in the skill text.

Report incorrect finding
Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 0.90). The skill explicitly navigates to and ingests arbitrary target URLs (e.g., Phase 3 "Page-by-Page Visual Audit" uses "$B goto <url>" and extraction commands like "$B js" to read DOM/CSS) and also uses WebSearch in the test-bootstrap flow, so it reads untrusted public/web or user-provided pages and acts on that content to drive findings and fixes.

Medium

W012: Unverifiable external dependency detected (runtime URL that controls agent)

What this means

The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.

Why it was flagged

Potentially malicious external URL detected (high risk: 0.90). The skill's setup step conditionally downloads and executes a remote installer at runtime via curl -fsSL "https://bun.sh/install" → bash "$tmpfile", which fetches and runs remote code as a required dependency for the browse/build step.

Repository
garrytan/gstack
Audited
Security analysis
Snyk

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.