This skill contains patterns for remote execution or sensitive file access. Review the source carefully before installing.
This skill ensures all code follows security best practices and identifies potential vulnerabilities. Use when implementing authentication or authorization, handling user input or file uploads, or creating new API endpoints.
AI-powered evaluation of trust, security posture, quality signals, and fit for your use case. Grounded in the skill's actual data.
Detected signals: sensitive file access, missing license.
• Accesses sensitive files (.env, credential files). For this skill type, this is worth investigating before using in production.
• No license declared. Usage rights are ambiguous — contact the skill author before using commercially.
Compare this skill side-by-side with an alternative to find the best fit.
Compare with another skill →