This skill contains shell command directives that may execute system commands. This skill contains patterns for remote execution or sensitive file access. Review the source carefully before installing.
Implement secure coding practices following OWASP Top 10. Use when preventing security vulnerabilities, implementing authentication, securing APIs, or conducting security reviews. Triggers on OWASP, security, XSS, SQL injection, CSRF, authentication security, secure coding, vulnerability.
AI-powered evaluation of trust, security posture, quality signals, and fit for your use case. Grounded in the skill's actual data.
Detected signals: shell mutation commands, sensitive file access, missing license.
• Modifies the shell environment or filesystem. This is unusual for most skills — review before installing.
• Accesses sensitive files (.env, credential files). For this skill type, this is worth investigating before using in production.
• No license declared. Usage rights are ambiguous — contact the skill author before using commercially.
Compare this skill side-by-side with an alternative to find the best fit.
Compare with another skill →