Dangerous exec
- Finding
- Shell command execution detected (child_process).
Security checks across static analysis, malware telemetry, and agentic risk
The skill generally matches its stated purpose (scanning/evaluating/editing local skills) but includes several behaviors and instruction inconsistencies — automatic post-install actions, programmatic plugin installation paths, and broad filesystem/command execution — that merit careful review before installing.
This skill appears to do what it says (evaluating and improving local skills) but is intrusive: it scans other installed skills, reads/writes ~/.claude/settings.json and a .skill-compass directory, executes local Node/Bash scripts, and can trigger plugin installs when called programmatically. Before installing: 1) Backup ~/.claude/settings.json and any important skill files. 2) Review the bundled JS files (lib/*, hooks/scripts/*) locally to satisfy yourself—they will run on your machine. 3) Decide whether you want automatic Post-Install Onboarding that runs silently on first session; if not, avoid installing or run in a restricted/sandboxed environment. 4) Be cautious about giving other automation permission to call this skill with --internal (that flag can bypass interactive prompts and auto-install plugins). 5) If you proceed, monitor what files it writes (.skill-compass, snapshots, locks) and review any plugin installs it performs.
No VirusTotal findings
No visible risk-analysis findings were reported for this release.