Back to skill
Skillv1.0.0
Static analysis security
Join meeting · Deterministic local checks for risky code patterns and metadata mismatches.
Scanner verdict
SuspiciousApr 22, 2026, 10:17 AM
- Summary
- Detected: suspicious.dynamic_code_execution, suspicious.env_credential_access, suspicious.potential_exfiltration
- Reason codes
- suspicious.dynamic_code_executionsuspicious.env_credential_accesssuspicious.potential_exfiltration
- Engine
- v2.4.0
Evidence
criticalexamples/meeting-assistant-smart/tools.py:93
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalexamples/notetaker-simple/notetaker.js:29
Environment variable access combined with network send.
suspicious.env_credential_access
criticalexamples/notetaker-smart/notetaker.js:34
Environment variable access combined with network send.
suspicious.env_credential_access
criticalscripts/node/agentcall.js:24
Environment variable access combined with network send.
suspicious.env_credential_access
criticalscripts/node/bridge-visual.js:58
Environment variable access combined with network send.
suspicious.env_credential_access
criticalscripts/node/bridge.js:50
Environment variable access combined with network send.
suspicious.env_credential_access
warnexamples/notetaker-simple/notetaker.js:26
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnexamples/notetaker-smart/notetaker.js:31
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnscripts/node/agentcall.js:5
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnscripts/node/bridge-visual.js:37
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnscripts/node/bridge.js:34
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
