Data & AI
audit-skills - Claude MCP Skill
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
SEO Guide: Enhance your AI agent with the audit-skills tool. This Model Context Protocol (MCP) server allows Claude Desktop and other LLMs to expert security auditor for ai skills and bundles. performs non-intrusive static analysis to identif... Download and configure this skill to unlock new capabilities for your AI workflow.
Documentation
SKILL.md<!-- security-allowlist: curl-pipe-bash --> # Audit Skills (Premium Universal Security) ## Overview Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS). 2-4 sentences is perfect. ## When to Use This Skill - Use when you need to audit AI skills and bundles for security vulnerabilities - Use when working with cross-platform security analysis - Use when the user asks about verifying skill legitimacy or performing security reviews - Use when scanning for mobile threats in AI skills ## How It Works ### Step 1: Static Analysis Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads. ### Step 2: Platform-Specific Threat Detection Analyzes code for platform-specific security issues across Windows, macOS, Linux/Unix, and Mobile (Android/iOS). #### 1. Privilege, Ownership & Metadata Manipulation - **Elevated Access**: `sudo`, `chown`, `chmod`, `TakeOwnership`, `icacls`, `Set-ExecutionPolicy`. - **Metadata Tampering**: `touch -t`, `setfile` (macOS), `attrib` (Windows), `Set-ItemProperty`, `chflags`. - **Risk**: Unauthorized access, masking activity, or making files immutable. #### 2. File/Folder Locking & Resource Denial - **Patterns**: `chmod 000`, `chattr +i` (immutable), `attrib +r +s +h`, `Deny` ACEs in `icacls`. - **Global Actions**: Locking or hiding folders in `%USERPROFILE%`, `/Users/`, or `/etc/`. - **Risk**: Denial of service or data locking. #### 3. Script Execution & Batch Invocation - **Legacy/Batch Windows**: `.bat`, `.cmd`, `cmd.exe /c`, `vbs`, `cscript`, `wscript`. - **Unix Shell**: `.sh`, `.bash`, `.zsh`, `chmod +x` followed by execution. - **PowerShell**: `.ps1`, `powershell -ExecutionPolicy Bypass -File ...`. - **Hidden Flags**: `-WindowStyle Hidden`, `-w hidden`, `-noprofile`. #### 4. Dangerous Install/Uninstall & System Changes - **Windows**: `msiexec /qn`, `choco uninstall`, `reg delete`. - **Linux/Unix**: `apt-get purge`, `yum remove`, `rm -rf /usr/bin/...`. - **macOS**: `brew uninstall`, deleting from `/Applications`. - **Risk**: Removing security software or creating unmonitored installation paths. #### 5. Mobile Application & OS Security (Android/iOS) - **Android Tools**: `adb shell`, `pm install`, `am start`, `apktool`, `dex2jar`, `keytool`. - **Android Files**: Manipulation of `AndroidManifest.xml` (permissions), `classes.dex`, or `strings.xml`. - **iOS Tools**: `xcodebuild`, `codesign`, `security find-identity`, `fastlane`, `xcrun`. - **iOS Files**: Manipulation of `Info.plist`, `Entitlements.plist`, or `Provisioning Profiles`. - **Mobile Patterns**: Jailbreak/Root detection bypasses, hardcoded API keys in mobile source, or sensitive permission requests (Camera, GPS, Contacts) in non-mobile skills. - **Risk**: Malicious mobile package injection, credential theft from mobile builds, or device manipulation via ADB. #### 6. Information Disclosure & Network Exfiltration - **Patterns**: `curl`, `wget`, `Invoke-WebRequest`, `Invoke-RestMethod`, `scp`, `ftp`, `nc`, `socat`. - **Sensible Data**: `.env`, `.ssh`, `cookies.sqlite`, `Keychains` (macOS), `Credentials` (Windows), `keystore` (Android). - **Intranet**: Scanning internal IPs or mapping local services. #### 7. Service, Process & Stability Manipulation - **Windows**: `Stop-Service`, `taskkill /f`, `sc.exe delete`. - **Unix/Mac**: `kill -9`, `pkill`, `systemctl disable/stop`, `launchctl unload`. - **Low-level**: Direct disk access (`dd`), firmware/BIOS calls, kernel module management. #### 8. Obfuscation & Persistence - **Encoding**: `Base64`, `Hex`, `XOR` loops, `atob()`. - **Persistence**: `reg add` (Run keys), `schtasks`, `crontab`, `launchctl` (macOS), `systemd` units. - **Tubes**: `curl ... | bash`, `iwr ... | iex`. #### 9. Legitimacy & Scope (Universal) - **Registry Alignment**: Cross-reference with `CATALOG.md`. - **Structural Integrity**: Does it follow the standard repo layout? - **Healthy Scope**: Does a "UI Design" skill need `adb shell` or `sudo`? ### Step 3: Reporting Generates a security report with a score (0-10), platform target identification, flagged actions, threat analysis, and mitigation recommendations. ## Examples ### Example 1: Security Review ```markdown "Perform a security audit on this skill bundle" ``` ### Example 2: Cross-Platform Threat Analysis ```markdown "Scan for mobile threats in this AI skill" ``` ## Best Practices - ✅ Perform non-intrusive analysis - ✅ Check for privilege escalation patterns - ✅ Look for information disclosure vulnerabilities - ✅ Analyze cross-platform threats - ❌ Don't execute potentially malicious code during audit - ❌ Don't modify the code being audited - ❌ Don't ignore mobile-specific security concerns ## Common Pitfalls - **Problem:** Executing code during audit **Solution:** Stick to static analysis methods only - **Problem:** Missing cross-platform threats **Solution:** Check for platform-specific security issues on all supported platforms - **Problem:** Failing to detect obfuscated payloads **Solution:** Look for encoding patterns like Base64, Hex, XOR loops, and atob() ## Related Skills - `@security-scanner` - Additional security scanning capabilities
Signals
Information
- Repository
- arlenagreer/claude_configuration_docs
- Author
- arlenagreer
- Last Sync
- 5/10/2026
- Repo Updated
- 5/7/2026
- Created
- 4/10/2026
Reviews (0)
No reviews yet. Be the first to review this skill!
Related Skills
upgrade-nodejs
Upgrading Bun's Self-Reported Node.js Version
cursorrules
CrewAI Development Rules
cn-check
Install and run the Continue CLI (`cn`) to execute AI agent checks on local code changes. Use when asked to "run checks", "lint with AI", "review my changes with cn", or set up Continue CI locally.
CLAUDE
CLAUDE.md
Related Guides
Bear Notes Claude Skill: Your AI-Powered Note-Taking Assistant
Learn how to use the bear-notes Claude skill. Complete guide with installation instructions and examples.
Mastering tmux with Claude: A Complete Guide to the tmux Claude Skill
Learn how to use the tmux Claude skill. Complete guide with installation instructions and examples.
OpenAI Whisper API Claude Skill: Complete Guide to AI-Powered Audio Transcription
Learn how to use the openai-whisper-api Claude skill. Complete guide with installation instructions and examples.