Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.
disler-hooks-mastery
A comprehensive Claude extension suite that provides 12+ lifecycle hooks, sub-agents, slash commands, and output styles for automated logging, security enforcement, text-to-speech feedback, and multi-agent orchestration.
49
/ 74 · Grade F-D
F-D = below 60 (deductions)
“I need to extend Claude's functionality with comprehensive automation, security enforcement, logging capabilities, and multi-agent orchestration through a unified plugin system.”
disler-hooks-mastery earned Verified status with a trust score of 49/74 (Grade F-D). Adversarial testing produced 4 findings (4 high). Supply chain is clean — 18 components with no known vulnerabilities. Tier is Verified rather than Certified due to unmitigated findings above severity thresholds.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco Skill Scanner
Adversarial Testing — 6 categories, 4 findings
Several hook scripts directly incorporate user-provided content (prompts, tool inputs, file paths) into their processing logic without explicit data boundary markers. The user_prompt_submit.py hook processes raw user prompts, and pre_tool_use.py processes tool inputs that could contain instruction-like content. While these hooks have some validation, they don't explicitly mark user content as data-only, creating potential injection surfaces.
Multiple hook scripts execute system commands and file operations using user-provided content as parameters. The pre_tool_use.py hook processes bash commands from user input, and various hooks perform file operations with user-controlled paths. While there is some validation for dangerous patterns, the parameter injection surface remains significant, especially for path traversal and command injection through tool parameters.
Multiple hook scripts contain conditional logic that references system state the user wouldn't anticipate, including environment variables (ENGINEER_NAME, ELEVENLABS_API_KEY, OPENAI_API_KEY), file existence checks, and system capabilities. These conditionals can alter behavior based on hidden system state rather than user-visible inputs.
The plugin declares 6 agents, 15 commands, 1 hook, and 35 scripts totaling 57 components, which is unusually large for a 'mastery' tutorial. This volume could obscure malicious content within legitimate educational material, making thorough review difficult.
Methodology v1.0 · 6 categories · ~55 attack patterns
Supply Chain
SBOM analysis and vulnerability assessment
Components
18
Direct deps
1
Transitive deps
17
Total vulns
0
Format: CycloneDX 1.5 · Generated: Apr 1, 2026
Component Inventory
57 components composing this plugin
agents
6
commands
15
hook
1
scripts
35
agents (6)
commands (15)
hooks (1)
scripts (35)
Interface
Aggregated instruction summary
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
no
no
yes
yes
yes
no
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "disler" is not verified — first certification from this publisher
No license file found in repository
No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process
Single contributor — no peer review evidence in commit history
Package description appears to be boilerplate or template text
Signed Artifact
Certification provenance and verification metadata
The original instruction file with a certification footer appended. Replace the source file in your project so AI agents see the trust score, verification link, and SOP.
ES256-signed JWS artifact for programmatic verification. Use with the Fidensa MCP server or GitHub Action to validate integrity.
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.