Designer's eye QA: finds visual inconsistency, spacing issues, hierarchy problems, AI slop patterns, and slow interactions — then fixes them. Iteratively fixes issues in source code, committing each fix atomically and re-verifying with before/after screenshots. For plan-mode design review (before implementation), use /plan-design-review. Use when asked to "audit the design", "visual QA", "check if it looks good", or "design polish". Proactively suggest when the user mentions visual inconsistencies or wants to polish the look of a live site. (gstack)
Security
3 findings — 1 critical severity, 2 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.
Detected a prompt injection in the skill instructions. The skill contains hidden or deceptive instructions that fall outside its stated purpose and attempt to override the agent’s safety guidelines or intended behavior.
Potential prompt injection detected (high risk: 0.80). The prompt contains many explicit but out-of-scope operational directives (telemetry logging/remote telemetry, gbrain session sync/publishing, auto-upgrade flows, writing/committing project-wide files like CLAUDE.md, vendoring migration, and broad config changes) that are not required for a design-review and can mutate the user's environment or push data off-machine — this is a hidden/deceptive-behavior risk even though the instructions are visible in the skill text.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The skill explicitly navigates to and ingests arbitrary target URLs (e.g., Phase 3 "Page-by-Page Visual Audit" uses "$B goto <url>" and extraction commands like "$B js" to read DOM/CSS) and also uses WebSearch in the test-bootstrap flow, so it reads untrusted public/web or user-provided pages and acts on that content to drive findings and fixes.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The skill's setup step conditionally downloads and executes a remote installer at runtime via curl -fsSL "https://bun.sh/install" → bash "$tmpfile", which fetches and runs remote code as a required dependency for the browse/build step.
db9447c
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.