Skip to main content

Security

Skillsmith protects your Claude Code environment through automated security scanning, trust verification, and a multi-tier defense system.

Security Boundaries

Skillsmith operates within a layered security model:

Trusted Zone

  • Claude model safety guardrails
  • Claude Code runtime sandbox
  • OS-level file access controls

Semi-Trusted Zone (Skillsmith)

  • Curated skill index
  • Quality scoring
  • Static security analysis
  • Trust tier verification
  • Conflict detection

Untrusted Zone

  • GitHub repositories
  • Third-party skill authors
  • Community registries

What We Scan For

Every skill is scanned for security issues before being made available. Findings are categorized by severity:

Critical Severity (Blocks Installation)

These patterns always block installation:

Category Detected Patterns
Jailbreak Attempts "ignore previous instructions", "developer mode", "bypass safety", "act as an AI without restrictions"
Malicious URLs External domains not on the allowlist (github.com, anthropic.com, claude.ai are allowed)

High Severity (Requires Confirmation)

These patterns require explicit user confirmation before proceeding:

Category Detected Patterns
SSRF Patterns file://, gopher://, ldap:// protocols, localhost references, private IP ranges
Sensitive File Access *.env*, *.pem, *.key, *credentials*, *secrets*
Dangerous Commands rm -rf, curl/wget to unknown domains, eval/exec with dynamic input

Medium Severity (Warning Only)

These patterns generate warnings but don't block installation:

Category Detected Patterns
Obfuscation High entropy content, possible base64 payloads, unusual character sequences
Permission Keywords References to sudo, root, admin, system modification commands

Threat Model

Skillsmith actively mitigates the following threats:

Threat Severity Mitigation Status
Malicious SKILL.md Critical Pattern scanning, trust tiers Active
Prompt injection Critical Pattern detection, entropy analysis Active
Typosquatting High Levenshtein distance, character substitution detection Active
Dependency hijacking Medium URL allowlist Active
Author key compromise Medium Anomaly detection Planned
Supply chain attack High Registry signing Planned

Best Practices for Users

1. Always Check Trust Tier

Before installing a skill, verify its trust tier:

  • Official/Verified: Generally safe for production use
  • Community: Review skill content before installing
  • Unverified: Only install if you personally trust the author

2. Review Unverified Skills

For unverified skills, always check:

  • Read the SKILL.md content for suspicious instructions
  • Look for unusual URLs or command patterns
  • Check the author's GitHub profile and other projects

3. Use Validation Before Manual Install

Use skillsmith validate <path> to run security scans on locally-downloaded skills.

4. Keep Skillsmith Updated

New security patterns are added regularly. Update with: npx @skillsmith/mcp-server@latest

Best Practices for Authors

To ensure your skill passes security scans:

  1. Avoid external URLs unless necessary. Prefer documented APIs (github.com, npm registry)
  2. Never request sensitive file access. Don't read .env files or credential stores
  3. Be explicit about permissions. Document what files you read/write and what commands you execute
  4. Submit for verification. Verified skills get more visibility and trust. See Trust Tiers

What Happens When Scans Fail

Skills that fail security scans are placed in quarantine. The severity of findings determines what happens next:

  • Critical findings: Skill cannot be installed
  • High findings: Manual review required before installation allowed
  • Medium findings: Skill can be installed with warnings displayed

Learn more about the quarantine system →

Reporting Security Issues

Vulnerabilities in Skillsmith

If you discover a vulnerability in Skillsmith itself:

Malicious Skills

To report a malicious or suspicious skill:

  • Open an issue on GitHub
  • Include the skill ID and specific concern
  • We investigate and blocklist within 24 hours

Related Documentation