Plugin Verified

everything-claude-code

A comprehensive AI-assisted development plugin that provides code generation, analysis, and security scanning capabilities across multiple programming languages including TypeScript, Python, Go, Swift, and PHP.

69

/ 100 · Grade D

D = 60–69

I need to accelerate full-stack development across multiple programming languages with AI-assisted code generation, analysis, and built-in security scanning capabilities.

development-toolscode-generationsecuritymulti-languageai-plugins
Publisher: Affaan MustafaVersion: 1.9.0Certified: Mar 28, 2026Expires: Mar 28, 2027Source ↗

everything-claude-code earned Verified status with a trust score of 69/100 (Grade D). No adversarial findings — all attack patterns were handled gracefully. Supply chain contains 467 components with 11 known vulnerabilities. Security scan flagged 128 findings. Tier is Verified rather than Certified due to unmitigated findings above severity thresholds.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
0% × 15w
0.0
supply chain
0% × 10w
0.0
adversarial
100% × 25w
25.0
provenance
70% × 20w
14.0
consumer confirm
100% × 10w
10.0
behavioral pass
100% × 10w
10.0
contract accuracy
100% × 6w
6.0
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco Skill Scanner

cisco-skill-scannerFAIL
staticbehavioralllmmeta
critical: 0high: 14medium: 44low: 70

Finding details

mediumsupply chain attackllmagent-eval

The skill instructs users to install 'agent-eval' from an external GitHub repository (github.com/joaquinhuigomez/agent-eval) without providing security verification steps. This creates a supply chain risk where users may install potentially malicious code from an untrusted source. The instruction 'Install agent-eval from its repository after reviewing the source' places the security burden on users without providing specific verification guidance.

lowskill discovery abusellmagent-eval

The skill manifest is missing several optional but recommended metadata fields including 'license', 'compatibility', and 'allowed-tools' in the YAML frontmatter. While these fields are optional per the agent skills specification, their absence makes it harder for users to understand the skill's requirements and restrictions.

lowskill discovery abusellmai-first-engineering

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage and restrictions.

lowskill discovery abusellmarticle-writing

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage constraints and compatibility requirements.

mediumskill discovery abusellmautonomous-loops

The skill package is incomplete and potentially deceptive. It claims to provide 'patterns and architectures for autonomous Claude Code loops' but contains no instruction body in SKILL.md and references four Python files (any.py, simple.py, ordering.py, its.py) that are missing from the package. This creates a capability inflation scenario where the skill appears to offer functionality it cannot deliver.

lowskill discovery abusellmautonomous-loops

The skill package is missing several optional but recommended metadata fields in the YAML frontmatter: license, compatibility, and allowed-tools. While these are not required, their absence makes it difficult to assess the skill's intended usage constraints and compatibility requirements.

lowskill discovery abusellmbackend-patterns

The skill is missing several optional metadata fields in the YAML manifest including license, compatibility, and allowed-tools. While these are optional fields, their absence reduces transparency about the skill's intended usage and restrictions.

lowskill discovery abusellmblueprint

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage constraints and compatibility requirements.

mediumsupply chain attackllmcarrier-relationship-management

The skill references 10 Python files with unusual naming patterns (40.py, claims.py, a.py, your.py, the.py, DAT.py, all.py, one.py, thousands.py, each.py) that are all missing from the package. These file names appear to form sentence fragments and could indicate obfuscated or malicious content delivery mechanisms.

lowskill discovery abusellmcarrier-relationship-management

The skill is missing optional metadata fields 'compatibility' and 'allowed-tools' which could help users understand the skill's requirements and limitations. While not required, these fields improve transparency and help prevent misuse.

mediumresource abusellmclaude-devfleet

The skill includes a blocking operation (wait_for_mission) that can tie up the agent for up to 600 seconds by default. While the documentation recommends polling instead, the blocking option could be used to cause denial of service.

mediumunauthorized tool usellmclaude-devfleet

The skill requires connection to an external Claude DevFleet MCP server (http://localhost:18801/mcp) but provides no validation or error handling for service availability. This creates a dependency on an external system that could be compromised or unavailable.

lowskill discovery abusellmclaude-devfleet

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it harder to assess the skill's intended scope and restrictions.

lowskill discovery abusellmclaude-devfleet

The skill description uses broad language ('orchestrate multi-agent coding tasks') that could lead to over-activation for tasks outside its intended scope. The skill is specifically designed for Claude DevFleet integration but the description doesn't clearly limit this scope.

lowskill discovery abusellmcodebase-onboarding

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it harder to understand the skill's intended usage constraints and compatibility requirements.

lowsupply chain attackllmcodebase-onboarding

The skill instructions reference three Python files (config.py, entry.py, recent.py) that are not present in the skill package. While these may be example filenames used for illustration purposes, missing referenced files could indicate incomplete skill packaging or potential supply chain issues.

mediumcommand injectionllmconfigure-ecc

The skill executes git clone with a hardcoded URL but also allows user-provided paths as fallback. If the user provides a malicious path containing shell metacharacters, it could lead to command injection when used in subsequent bash operations.

mediumunauthorized tool usellmconfigure-ecc

The skill performs extensive file system operations (Read, Write, Bash) and network operations (git clone) but does not declare any allowed-tools restrictions in the YAML manifest. While this field is optional, the skill's behavior suggests it should declare [Read, Write, Bash] for transparency.

lowskill discovery abusellmconfigure-ecc

The skill is missing optional metadata fields (license, compatibility) that would help users understand the skill's requirements and licensing terms.

lowdata exfiltrationllmcontent-hash-cache-pattern

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage and tool requirements.

highresource abusellmcontinuous-agent-loop

The skill promotes continuous autonomous agent loops with potential for unbounded execution. The instructions explicitly mention 'loop churn without measurable progress', 'repeated retries with same root cause', and 'cost drift from unbounded escalation' as known failure modes, indicating awareness of resource exhaustion risks. The skill references 'unbounded.py' which could not be found, suggesting missing critical implementation details for safety controls.

mediumskill discovery abusellmcontinuous-agent-loop

The skill references 'unbounded.py' in its instructions but this file is not found in the package. This creates uncertainty about the actual implementation and safety controls for the autonomous loops described. The missing file could contain critical safety mechanisms or dangerous unbounded execution patterns.

lowskill discovery abusellmcontinuous-agent-loop

The skill manifest is missing several optional but recommended fields including license, compatibility, and allowed-tools specifications. While not required, these fields help users understand the skill's requirements and restrictions.

mediumdata exfiltrationllmcontinuous-learning

The skill accesses Claude Code session transcripts which may contain sensitive information including code, credentials, API keys, or personal data. The transcript path is obtained from hook input and processed without validation or sanitization. While the current implementation only counts messages, the infrastructure exists to read full transcript content.

mediumunauthorized tool usellmcontinuous-learning

The skill creates and writes to directories in the user's home directory (~/.claude/skills/learned/) without explicit user consent. The YAML manifest does not declare 'Write' in allowed-tools, but the script performs file system modifications. This violates the principle of least privilege and could be used for persistence or data manipulation.

lowskill discovery abusellmcontinuous-learning

The skill manifest is missing several optional but recommended fields including 'license', 'compatibility', and 'allowed-tools'. The 'allowed-tools' field is particularly important as the skill performs file system operations that should be declared.

lowdata exfiltrationllmcontinuous-learning

The script falls back to reading the CLAUDE_TRANSCRIPT_PATH environment variable, which could potentially be manipulated by other processes or contain unexpected paths. While this appears to be for backwards compatibility, it creates an additional attack surface.

highcommand injectionllmcontinuous-learning-v2

Multiple scripts use environment variables and user-controlled input in shell commands without proper sanitization. The observer-loop.sh script constructs file paths and command arguments using variables that could contain shell metacharacters, leading to command injection vulnerabilities.

highdata exfiltrationllmcontinuous-learning-v2

The observer-loop.sh script contains hardcoded credential patterns and executes automated Claude sessions with access to sensitive files. The script reads observations that may contain credentials, API keys, and other secrets, then passes this data to external Claude API calls without proper sanitization. While there is some regex-based scrubbing, the patterns are incomplete and the data is still transmitted to external services.

mediumdata exfiltrationllmcontinuous-learning-v2

The observation hooks collect and store detailed information about user tool usage, including command inputs, outputs, and file paths. This data is stored in plaintext JSONL files and includes potentially sensitive information like file contents, command arguments, and system paths.

mediumunauthorized tool usellmcontinuous-learning-v2

The observer system automatically grants itself Read and Write tool access without user consent and can modify the file system through instinct file creation. The system bypasses normal tool restrictions by running automated Claude sessions with elevated privileges.

mediumunauthorized tool usestaticcontinuous-learning-v2

Skill code uses network libraries but doesn't declare network requirement

mediumresource abusellmcontinuous-learning-v2

The observer system can spawn multiple concurrent Claude analysis processes without proper resource limits. The observer-loop.sh script has some throttling mechanisms but still allows for potential resource exhaustion through rapid observation accumulation and parallel process spawning.

lowskill discovery abusellmcontinuous-learning-v2

The skill description claims to be an 'advanced learning system' with broad capabilities including 'evolving instincts into skills/commands/agents' and 'automatic learning from Claude Code sessions'. The activation triggers are very broad and could lead to unwanted activation in many contexts.

mediumskill discovery abusellmcpp-coding-standards

The skill references three Python files (run.py, the.py, functions.py) in its instructions but these files are not found in the skill package. This creates a broken skill that cannot function as intended and may cause runtime errors when the agent attempts to execute the missing components.

lowskill discovery abusellmcpp-coding-standards

The skill package is missing several optional but recommended metadata fields including license, compatibility, and allowed-tools. While not a security threat, this reduces transparency about the skill's intended usage and restrictions.

lowskill discovery abusellmcpp-coding-standards

The skill has no markdown instruction body, making it unclear how the skill should be used or what functionality it provides. This could lead to unpredictable behavior when the agent attempts to use the skill.

mediumcommand injectionllmcrosspost

The example code makes HTTP requests to external services without proper input validation or sanitization. The endpoint URL and request data are not validated, which could lead to injection attacks if user input is incorporated into the requests.

mediumdata exfiltrationllmcrosspost

The skill references a hardcoded environment variable 'POSTBRIDGE_API_KEY' in example code that could expose API credentials. While this is in example code, it demonstrates a pattern that could lead to credential exposure if implemented without proper security practices.

mediumdata exfiltrationbehavioralcrosspost

Code block in SKILL.md at line 147 contains potentially dangerous Python code.

lowskill discovery abusellmcrosspost

The skill manifest is missing optional fields like 'license', 'compatibility', and 'allowed-tools' which provide important context about the skill's intended usage and restrictions.

lowunauthorized tool usellmcrosspost

The skill references a file 'one.py' in its instructions but this file is not found in the skill package. This could indicate incomplete packaging or broken references.

highsupply chain attackllmcustoms-trade-compliance

The skill references 15 Python files (the.py, Incoterms.py, duties.py, entries.py, a.py, industrial.py, or.py, clearance.py, foreign.py, different.py, their.py, 8542.py, period.py, an.py, suppliers.py) that are completely missing from the package. This creates a broken skill that cannot function as intended and may indicate supply chain compromise, incomplete packaging, or dependency injection vulnerabilities. The skill claims extensive trade compliance expertise but lacks any implementation.

mediumskill discovery abusellmcustoms-trade-compliance

The skill makes extensive claims about trade compliance expertise ('15+ years experience', 'HS classification logic', 'Incoterms application', 'FTA utilization', 'penalty mitigation') but provides no actual implementation. The instruction body is completely empty, and all referenced implementation files are missing. This represents capability inflation where the skill overstates its abilities.

lowresource abusellmcustoms-trade-compliance

The skill is missing optional metadata fields including 'compatibility' and 'allowed-tools'. While these are not required, their absence makes it unclear what agent tools the skill expects to use and what environments it's compatible with.

highskill discovery abusellmdata-scraper-agent

The skill claims to be a 'fully automated AI-powered data collection agent' but contains no actual implementation code. The description promises extensive functionality including web scraping, LLM integration, database storage, and GitHub Actions automation, but the skill package is essentially empty with no SKILL.md instruction body and no script files. This represents capability inflation where the skill overstates its abilities to increase activation likelihood.

mediumsupply chain attackllmdata-scraper-agent

The skill references 22 external Python modules/files that are not found in the package, creating potential supply chain vulnerabilities. These missing dependencies could lead to runtime failures or create opportunities for dependency confusion attacks if malicious packages with similar names are installed.

lowsupply chain attackllmdata-scraper-agent

The skill lacks important metadata including license, compatibility information, and allowed-tools specification. This makes it difficult to assess the skill's intended usage scope and security boundaries. The absence of proper provenance information reduces trust and makes security assessment more challenging.

lowprompt injectionllmdeep-research

The skill relies heavily on external web sources (firecrawl and exa MCPs) to fetch and process content from arbitrary URLs without explicit validation mechanisms. While this is the intended functionality for research, it creates potential for indirect prompt injection if malicious content is encountered in web sources.

lowskill discovery abusellmdeep-research

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's requirements and restrictions.

lowskill discovery abusellmdeep-research

The skill uses very broad activation keywords that could lead to unintended activation. Keywords like 'research', 'investigate', 'what's the current state of' are extremely common and could trigger this skill for simple queries that don't require deep multi-source research.

lowskill discovery abusellmdjango-patterns

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage and restrictions.

lowskill discovery abusellmdjango-tdd

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage and restrictions.

lowdata exfiltrationllmdjango-verification

The skill manifest is missing several optional but recommended metadata fields including license, compatibility, and allowed-tools. While not a security vulnerability, this reduces transparency about the skill's intended usage and tool requirements.

mediumprompt injectionllmdmux-workflows

The skill instructs users to install dmux from an external GitHub repository (github.com/standardagents/dmux) after 'reviewing the package'. This creates a transitive trust relationship where malicious instructions could be embedded in the external repository's documentation, README, or installation scripts that could override the agent's intended behavior.

lowskill discovery abusellmdmux-workflows

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While not required, these fields help users understand the skill's requirements and restrictions.

highhardcoded secretsstaticdocker-patterns

Pattern detected: postgres://postgres:postgres@

lowdata exfiltrationllmdocker-patterns

The skill documentation contains example database connection strings with hardcoded credentials (postgres:postgres). While these appear to be example/development credentials in documentation, they could be copied by users into production environments, creating security risks.

lowskill discovery abusellmdocker-patterns

The skill manifest is missing optional metadata fields including license, compatibility, and allowed-tools. While not required, these fields help users understand the skill's requirements and restrictions.

lowunauthorized tool usellmdocker-patterns

The skill references four Python files (db.py, bind.py, local.py, host.py) in its instructions, but these files are not present in the skill package. This could lead to confusion or errors when users try to follow the instructions.

lowdata exfiltrationllmdocumentation-lookup

The skill sends user queries to an external MCP service (Context7) which could potentially log or store user questions. While the skill includes guidance to redact sensitive data, user queries may inadvertently contain sensitive information that gets transmitted to the external service.

lowprompt injectionllmdocumentation-lookup

The skill places implicit trust in documentation content returned by the Context7 MCP service without validation. Malicious or compromised documentation sources could potentially inject harmful instructions or misleading information that the agent would then relay to users.

lowskill discovery abusellmdocumentation-lookup

The skill manifest is missing several optional but recommended metadata fields including license, compatibility, and allowed-tools. This reduces transparency about the skill's requirements and intended usage scope.

mediumsupply chain attackllmenergy-procurement

The skill references 8 Python files (prior.py, generation.py, the.py, your.py, shaped.py, a.py, qualified.py, physical.py) that are not found in the package. These appear to be incomplete or corrupted file references that could indicate a supply chain compromise, incomplete package distribution, or dependency issues. The unusual naming pattern (single words like 'the.py', 'a.py') suggests potential corruption or automated generation errors.

lowskill discovery abusellmenergy-procurement

The skill manifest is missing optional fields 'compatibility' and 'allowed-tools' which provide important context about the skill's intended usage and tool restrictions. While these fields are optional per the agent skills specification, their absence makes it harder to validate appropriate usage and security boundaries.

lowskill discovery abusellmenterprise-agent-ops

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage constraints and compatibility requirements.

lowskill discovery abusellmenterprise-agent-ops

The skill description uses broad, enterprise-level terminology ('operate long-lived agent workloads', 'observability', 'security boundaries') without clearly defining what specific actions the skill can perform. This could lead to unclear expectations about the skill's actual capabilities.

lowdata exfiltrationllmfal-ai-media

The skill manifest is missing optional fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's requirements and restrictions.

lowdata exfiltrationllmfal-ai-media

The skill references three files (video.py, text.py, an.py) in its instructions but these files are not present in the skill package. This could indicate incomplete packaging or potential confusion about skill structure.

lowsupply chain attackllmfal-ai-media

The skill instructs users to install the fal-ai MCP server using 'npx -y fal-ai-mcp-server' without specifying a version. This could lead to supply chain risks if the package is updated with malicious code.

mediumprompt injectionllmflutter-dart-code-review

The skill references four Python files (style.py, maintainers.py, only.py, public.py) that are not found in the package. If these files are expected to be provided externally or by users, they could contain malicious instructions that override the skill's intended behavior. The skill appears to have no instruction body in SKILL.md, suggesting it may rely entirely on these missing external files for its functionality.

lowskill discovery abusellmflutter-dart-code-review

The skill is missing several optional but recommended metadata fields including license, compatibility, and allowed-tools. While not a security threat, this reduces transparency about the skill's intended usage and restrictions.

lowskill discovery abusellmfoundation-models-on-device

The skill manifest is missing several optional but recommended metadata fields including license, compatibility, and allowed-tools. While these fields are not required, their absence makes it harder to assess the skill's intended usage scope and compatibility requirements.

highsupply chain attackllminventory-demand-planning

The skill references 14 Python script files (forecast.py, the.py, similar.py, Week.py, existing.py, 14.py, current.py, your.py, history.py, selling.py, first.py, dominating.py, an.py, vendors.py) but none of these files are present in the skill package. This creates a supply chain integrity issue where the skill cannot function as intended and may lead to runtime errors or unexpected behavior when the agent attempts to execute missing dependencies.

mediumskill discovery abusellminventory-demand-planning

The skill claims to provide 'codified expertise for demand forecasting, safety stock optimization, replenishment planning' but lacks the actual implementation files. The instruction body is empty, and all referenced Python scripts are missing. This represents capability inflation where the skill advertises functionality it cannot deliver.

lowresource abusellminventory-demand-planning

The skill manifest is missing optional fields 'compatibility' and 'allowed-tools' which provide important context for proper skill usage and security boundaries. While not critical, these fields help users and systems understand the skill's requirements and limitations.

mediumskill discovery abusellmkotlin-exposed-patterns

The skill references a file 'the.py' that is not present in the package. This could indicate incomplete packaging, broken functionality, or potentially suspicious behavior where the skill expects external files.

lowskill discovery abusellmkotlin-exposed-patterns

The skill is missing optional metadata fields including license, compatibility, and allowed-tools. While not required, these fields help users understand the skill's requirements and restrictions.

lowdata exfiltrationllmlaravel-security

The skill instructions reference two Python files (encrypted.py and users.py) that are not present in the skill package. While this doesn't pose an immediate security threat, missing referenced files could lead to confusion or errors when users attempt to follow the instructions.

lowskill discovery abusellmlaravel-security

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage and tool requirements.

lowskill discovery abusellmliquid-glass-design

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it harder to assess the skill's intended scope and restrictions.

lowskill discovery abusellmmarket-research

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it harder to assess the skill's intended scope and restrictions.

lowdata exfiltrationllmnutrient-document-processing

The skill instructs users to export their Nutrient API key as an environment variable but lacks security guidance about protecting this credential. While the skill itself doesn't hardcode secrets, it could provide better guidance on secure credential management.

lowdata exfiltrationllmnutrient-document-processing

The skill references a file 'PDFs.py' in the instructions but this file is not present in the skill package. This could indicate incomplete packaging or missing dependencies.

lowskill discovery abusellmnutrient-document-processing

The skill manifest is missing optional metadata fields including license, compatibility, and allowed-tools. While not required, these fields help users understand the skill's requirements and restrictions.

highcommand injectionllmplankton-code-quality

The skill describes spawning Claude subprocesses with user-controlled data (violation JSON) and executing shell commands through hooks. The multi_linter.sh hook runs formatters and linters with potential command injection vectors through file paths and violation data.

mediumobfuscationllmplankton-code-quality

The skill operates largely invisibly to the main agent, with most operations happening in background hooks that don't report their actions. This creates opacity around what code is being executed and modified.

mediumskill discovery abusellmplankton-code-quality

The skill claims to provide 'write-time code quality enforcement' but actually implements a complex system that can block tools, modify files silently, and spawn subprocesses. The actual capabilities far exceed what's described in the simple description.

mediumunauthorized tool usellmplankton-code-quality

The skill implements a hook system that can block legitimate tool usage (PreToolUse hooks block package managers like pip, npm) and modify file operations without user awareness. This could interfere with normal agent tool functionality.

mediumskill discovery abusellmproduction-scheduling

The skill claims extensive production scheduling expertise including 'TOC/drum-buffer-rope, SMED, OEE analysis, disruption response frameworks, and ERP/MES interaction patterns' and states it is 'informed by production schedulers with 15+ years experience.' However, the skill contains no actual implementation - no script files and no instruction body content. This represents capability inflation where the skill over-promises functionality it cannot deliver.

lowskill discovery abusellmproduction-scheduling

The skill is missing optional metadata fields including 'compatibility' and 'allowed-tools' specifications. While these are not required, their absence makes it unclear what environments the skill supports and what agent tools it intends to use, which could lead to unexpected behavior or compatibility issues.

mediumsupply chain attackllmquality-nonconformance

The skill references 6 Python files (Approved.py, that.py, the.py, incoming.py, rework.py, adjacent.py) that are not found in the package. These missing files could indicate incomplete packaging, dependency issues, or potential supply chain compromise if the skill expects these files to be present for proper operation.

lowskill discovery abusellmquality-nonconformance

The skill is missing optional metadata fields 'compatibility' and 'allowed-tools' which could help users understand the skill's requirements and limitations. While not a security threat, this reduces transparency about the skill's intended usage patterns.

lowskill discovery abusellmralphinho-rfc-pipeline

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it difficult to assess the skill's intended scope and restrictions.

lowunauthorized tool usellmralphinho-rfc-pipeline

The skill instructions reference a file 'active.py' that is not found in the skill package. This could indicate incomplete packaging or a broken reference that might affect skill functionality.

highsupply chain attackllmreturns-reverse-logistics

The skill references 10 Python files (delivery.py, multiple.py, store.py, address.py, returns.py, same.py, expected.py, original.py, shipping.py, vendor.py) that are not found in the package. This creates a supply chain integrity issue where the skill cannot function as intended and may fail unexpectedly when users attempt to use it. The missing files could also indicate an incomplete or corrupted package distribution.

mediumskill discovery abusellmreturns-reverse-logistics

The skill claims extensive returns management capabilities ('codified expertise for returns authorization, receipt and inspection, disposition decisions, refund processing, fraud detection, and warranty claims management') but provides no actual implementation. The SKILL.md contains no instruction body, and all referenced Python files are missing. This represents capability inflation where the skill cannot deliver on its promised functionality.

lowskill discovery abusellmreturns-reverse-logistics

The skill is missing optional metadata fields that would help users understand its capabilities and restrictions. The 'compatibility' and 'allowed-tools' fields are not specified, making it unclear what environments the skill supports or what agent tools it requires.

mediumcommand injectionllmrules-distill

The bash scripts use user-controlled environment variables (RULES_DISTILL_DIR, RULES_DISTILL_GLOBAL_DIR, RULES_DISTILL_PROJECT_DIR) in file system operations without proper validation. While some basic path validation exists, an attacker could potentially manipulate these environment variables to access unintended directories or inject commands through path manipulation.

mediumprompt injectionllmrules-distill

The skill reads and processes content from external skill files and rule files, then feeds this content to LLM subagents for analysis. Malicious skills could embed instructions that manipulate the analysis process, potentially causing the LLM to generate harmful rules or bypass safety measures during the cross-reading phase.

mediumunauthorized tool usellmrules-distill

The skill performs file system operations (reading skills, rules, writing results) and executes bash scripts, but does not declare any allowed-tools in the manifest. This violates the principle of explicit tool permission declaration and could lead to unauthorized tool usage.

lowdata exfiltrationllmrules-distill

The scripts traverse and read files from user directories (~/.claude/skills, ~/.claude/rules) and project directories. While this appears to be the intended functionality, there's potential for information disclosure if the skill is used in environments where these directories contain sensitive information.

lowskill discovery abusellmsanta-method

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's requirements and constraints.

highdata exfiltrationllmskill-comply

The skill has broad file system access capabilities that could be exploited for data exfiltration. The runner.py creates sandbox directories in /tmp and executes claude with --add-dir flag, potentially exposing sensitive files. The skill reads arbitrary user-specified files (skill_path argument) and processes their content through LLM calls, which could leak sensitive information through the model API calls.

highcommand injectionllmskill-comply

The skill executes arbitrary shell commands through subprocess.run() with user-controlled input in multiple locations. In runner.py, scenario setup_commands are executed directly via shlex.split() and subprocess.run() without validation. In spec_generator.py and scenario_generator.py, the skill calls 'claude -p' with user-provided prompts that could contain shell metacharacters. This allows command injection if malicious content is embedded in skill files or generated scenarios.

mediumresource abusellmskill-comply

The skill performs potentially resource-intensive operations without proper limits. It executes scenarios with configurable max_turns (default 30) and timeout (300s), but these could be set to excessive values. The skill also processes arbitrary file sizes and generates multiple LLM calls per execution, which could lead to compute exhaustion if used with large files or malicious inputs designed to consume resources.

lowdata exfiltrationllmskill-comply

The skill's YAML manifest is missing optional but important metadata fields including license and compatibility information. While not a direct security threat, this lack of provenance information makes it harder to assess the skill's trustworthiness and intended usage scope.

lowunauthorized tool usellmskill-comply

The skill's YAML manifest declares 'tools: Read, Bash' but the actual implementation uses significantly more tools including Write, Edit, Glob, and Grep. The runner.py explicitly enables '--allowedTools Read,Write,Edit,Bash,Glob,Grep' which violates the declared tool restrictions. This represents tool capability inflation where the skill claims limited functionality but actually has broader permissions.

lowdata exfiltrationllmspringboot-security

The skill instructions reference a file 'env.py' that is not included in the skill package. This could indicate incomplete packaging or a documentation error.

lowskill discovery abusellmswift-protocol-di-testing

The skill is missing several optional metadata fields in the YAML manifest including license, compatibility, and allowed-tools. While these are optional, their absence reduces transparency about the skill's requirements and usage constraints.

lowskill discovery abusellmswiftui-patterns

The skill manifest is missing optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence reduces transparency about the skill's intended usage and restrictions.

lowdata exfiltrationllmteam-builder

The skill manifest is missing optional fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it harder to assess the skill's intended scope and restrictions.

mediumcommand injectionllmverification-loop

The skill instructs the agent to execute various shell commands (npm, pnpm, npx, pyright, ruff, grep, git) without any validation or sandboxing. While these are legitimate development tools, the skill provides no guidance on validating command safety or handling potentially malicious project configurations that could exploit these commands.

lowdata exfiltrationllmverification-loop

The skill includes commands to search for API keys and secrets (grep for 'sk-' and 'api_key') which could inadvertently expose sensitive information in the verification report output. While the intent is security scanning, the implementation could lead to secrets being displayed in logs or reports.

lowskill discovery abusellmverification-loop

The skill manifest is missing several optional metadata fields including license, compatibility, and allowed-tools. While these fields are optional per the agent skills specification, their absence makes it harder to assess the skill's intended scope and restrictions.

highresource abusestaticvideodb

Pattern detected: while True:

mediumunauthorized tool usellmvideodb

The skill declares 'allowed-tools: Read Grep Glob Bash(python:*)' but the instructions extensively use Python execution and file operations that may exceed read-only access. The skill performs network operations, file writing (PID files, event logs), and system-level operations that go beyond the declared tool restrictions.

mediumpolicy violationstaticvideodb

Skill restricts tools to ['Read Grep Glob Bash(python:*)'] but bundled scripts appear to write to the filesystem, which conflicts with a read-only tool declaration.

mediumresource abusellmvideodb

The ws_listener.py script contains an infinite while loop (while retry_count < MAX_RETRIES) that could potentially run indefinitely under certain error conditions. While there are retry limits and backoff mechanisms, the outer connection loop could theoretically continue forever if connection attempts consistently fail in ways that don't increment retry_count properly.

highprompt injectionllmvisa-doc-translate

The skill contains explicit instructions to bypass user consent and execute operations automatically. The instruction 'AUTOMATICALLY execute the following steps WITHOUT asking for confirmation' is a direct prompt injection that overrides normal safety protocols requiring user consent for potentially sensitive operations like file processing and PDF generation.

mediumdata exfiltrationllmvisa-doc-translate

The skill is designed to process highly sensitive visa application documents (bank statements, employment certificates, ID cards, passports) without implementing any security controls, access restrictions, or data handling safeguards. This creates risks for unauthorized access to personal financial and identity information.

mediumunauthorized tool usellmvisa-doc-translate

The skill does not declare any allowed-tools restrictions in its manifest but instructs the agent to use multiple tools including file operations, shell commands, and Python execution. This creates a tool exploitation risk where the skill can use any available agent tools without restrictions.

mediumcommand injectionllmvisa-doc-translate

The skill instructs the agent to execute shell commands with user-provided file paths using sips command for HEIC conversion. This creates a command injection risk if file paths contain malicious characters or shell metacharacters that could be interpreted by the shell.

lowskill discovery abusellmvisa-doc-translate

The skill manifest is missing several optional but important metadata fields including license and compatibility information. While not a direct security threat, this reduces transparency and makes it harder to assess the skill's intended usage and restrictions.

highdata exfiltrationllmx-api

The skill contains multiple code examples that demonstrate reading sensitive credentials from environment variables (X_API_KEY, X_API_SECRET, X_ACCESS_TOKEN, X_ACCESS_SECRET, X_BEARER_TOKEN) without proper validation or error handling. While using environment variables is a security best practice, the examples lack safeguards against credential exposure through error messages, logs, or debugging output.

mediumcommand injectionllmx-api

The skill demonstrates API interactions without proper input validation or sanitization. User-provided content is directly passed to API endpoints without validation, which could lead to injection attacks or unexpected API behavior. The post_thread function and other examples accept arbitrary user input without sanitization.

mediumdata exfiltrationllmx-api

The media upload example opens files without proper validation or access controls. The code demonstrates opening files directly from the filesystem without checking file permissions, validating file types, or ensuring the file path is safe. This could lead to unauthorized file access or path traversal attacks.

lowskill discovery abusellmx-api

The skill manifest is missing several optional but recommended metadata fields including license, compatibility, and allowed-tools. While not required, these fields help users understand the skill's requirements and limitations.

Adversarial Testing — 6 categories, 0 findings

prompt injection chainsprivilege escalationdata exfiltration side channelscapability squattingcontext poisoningdependency confusion

No adversarial findings — all attack patterns handled gracefully.

Methodology v1.0 · 6 categories · ~55 attack patterns

Pipeline Review — 7 findings

highsecurity

cisco_skill_scanner: high finding — resource_abuse

highsecurity

cisco_skill_scanner: high finding — command_injection

highsecurity

cisco_skill_scanner: high finding — data_exfiltration

highsecurity

cisco_skill_scanner: high finding — supply_chain_attack

highsecurity

cisco_skill_scanner: high finding — skill_discovery_abuse

highsecurity

cisco_skill_scanner: high finding — hardcoded_secrets

highsecurity

cisco_skill_scanner: high finding — prompt_injection


Supply Chain

SBOM analysis and vulnerability assessment

Components

467

Direct deps

4

Transitive deps

463

Total vulns

11

Vulnerability breakdown

critical: 0high: 6medium: 2low: 3

Format: CycloneDX 1.5 · Generated: Mar 28, 2026


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

8

Error rate

0.0%

Peak memory

— MB

Avg CPU

—%

Response time distribution

p50: 23875msp95: 28014msp99: 28014ms

Output size distribution

p50: 6.9 KBp95: 7.2 KBmean: 5.3 KB

Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline


Component Inventory

357 components composing this plugin

skills

126

agents

29

commands

63

hook

1

scripts

138

skills (126)

agent-evalskills/agent-eval
agent-harness-constructionskills/agent-harness-construction
agentic-engineeringskills/agentic-engineering
ai-first-engineeringskills/ai-first-engineering
ai-regression-testingskills/ai-regression-testing
android-clean-architectureskills/android-clean-architecture
api-designskills/api-design
architecture-decision-recordsskills/architecture-decision-records
article-writingskills/article-writing
autonomous-loopsskills/autonomous-loops
backend-patternsskills/backend-patterns
benchmarkskills/benchmark
blueprintskills/blueprint
browser-qaskills/browser-qa
bun-runtimeskills/bun-runtime
canary-watchskills/canary-watch
carrier-relationship-managementskills/carrier-relationship-management
claude-apiskills/claude-api
claude-devfleetskills/claude-devfleet
click-path-auditskills/click-path-audit
clickhouse-ioskills/clickhouse-io
codebase-onboardingskills/codebase-onboarding
coding-standardsskills/coding-standards
compose-multiplatform-patternsskills/compose-multiplatform-patterns
configure-eccskills/configure-ecc
content-engineskills/content-engine
content-hash-cache-patternskills/content-hash-cache-pattern
context-budgetskills/context-budget
continuous-agent-loopskills/continuous-agent-loop
continuous-learningskills/continuous-learning
continuous-learning-v2skills/continuous-learning-v2
cost-aware-llm-pipelineskills/cost-aware-llm-pipeline
cpp-coding-standardsskills/cpp-coding-standards
cpp-testingskills/cpp-testing
crosspostskills/crosspost
customs-trade-complianceskills/customs-trade-compliance
data-scraper-agentskills/data-scraper-agent
database-migrationsskills/database-migrations
deep-researchskills/deep-research
deployment-patternsskills/deployment-patterns
design-systemskills/design-system
django-patternsskills/django-patterns
django-securityskills/django-security
django-tddskills/django-tdd
django-verificationskills/django-verification
dmux-workflowsskills/dmux-workflows
docker-patternsskills/docker-patterns
documentation-lookupskills/documentation-lookup
e2e-testingskills/e2e-testing
energy-procurementskills/energy-procurement
enterprise-agent-opsskills/enterprise-agent-ops
eval-harnessskills/eval-harness
exa-searchskills/exa-search
fal-ai-mediaskills/fal-ai-media
flutter-dart-code-reviewskills/flutter-dart-code-review
foundation-models-on-deviceskills/foundation-models-on-device
frontend-patternsskills/frontend-patterns
frontend-slidesskills/frontend-slides
golang-patternsskills/golang-patterns
golang-testingskills/golang-testing
inventory-demand-planningskills/inventory-demand-planning
investor-materialsskills/investor-materials
investor-outreachskills/investor-outreach
iterative-retrievalskills/iterative-retrieval
java-coding-standardsskills/java-coding-standards
jpa-patternsskills/jpa-patterns
kotlin-coroutines-flowsskills/kotlin-coroutines-flows
kotlin-exposed-patternsskills/kotlin-exposed-patterns
kotlin-ktor-patternsskills/kotlin-ktor-patterns
kotlin-patternsskills/kotlin-patterns
kotlin-testingskills/kotlin-testing
laravel-patternsskills/laravel-patterns
laravel-securityskills/laravel-security
laravel-tddskills/laravel-tdd
laravel-verificationskills/laravel-verification
liquid-glass-designskills/liquid-glass-design
logistics-exception-managementskills/logistics-exception-management
market-researchskills/market-research
mcp-server-patternsskills/mcp-server-patterns
nanoclaw-replskills/nanoclaw-repl
nextjs-turbopackskills/nextjs-turbopack
nutrient-document-processingskills/nutrient-document-processing
nuxt4-patternsskills/nuxt4-patterns
perl-patternsskills/perl-patterns
perl-securityskills/perl-security
perl-testingskills/perl-testing
plankton-code-qualityskills/plankton-code-quality
postgres-patternsskills/postgres-patterns
product-lensskills/product-lens
production-schedulingskills/production-scheduling
project-guidelines-exampleskills/project-guidelines-example
prompt-optimizerskills/prompt-optimizer
python-patternsskills/python-patterns
python-testingskills/python-testing
pytorch-patternsskills/pytorch-patterns
quality-nonconformanceskills/quality-nonconformance
ralphinho-rfc-pipelineskills/ralphinho-rfc-pipeline
regex-vs-llm-structured-textskills/regex-vs-llm-structured-text
returns-reverse-logisticsskills/returns-reverse-logistics
rules-distillskills/rules-distill
rust-patternsskills/rust-patterns
rust-testingskills/rust-testing
safety-guardskills/safety-guard
santa-methodskills/santa-method
search-firstskills/search-first
security-reviewskills/security-review
security-scanskills/security-scan
skill-complyskills/skill-comply
skill-stocktakeskills/skill-stocktake
springboot-patternsskills/springboot-patterns
springboot-securityskills/springboot-security
springboot-tddskills/springboot-tdd
springboot-verificationskills/springboot-verification
strategic-compactskills/strategic-compact
swift-actor-persistenceskills/swift-actor-persistence
swift-concurrency-6-2skills/swift-concurrency-6-2
swift-protocol-di-testingskills/swift-protocol-di-testing
swiftui-patternsskills/swiftui-patterns
tdd-workflowskills/tdd-workflow
team-builderskills/team-builder
verification-loopskills/verification-loop
video-editingskills/video-editing
videodbskills/videodb
visa-doc-translateskills/visa-doc-translate
x-apiskills/x-api
everything-claude-code.claude/skills/everything-claude-code

agents (29)

architectagents/architect.md
build-error-resolveragents/build-error-resolver.md
chief-of-staffagents/chief-of-staff.md
code-revieweragents/code-reviewer.md
cpp-build-resolveragents/cpp-build-resolver.md
cpp-revieweragents/cpp-reviewer.md
database-revieweragents/database-reviewer.md
doc-updateragents/doc-updater.md
docs-lookupagents/docs-lookup.md
e2e-runneragents/e2e-runner.md
flutter-revieweragents/flutter-reviewer.md
go-build-resolveragents/go-build-resolver.md
go-revieweragents/go-reviewer.md
harness-optimizeragents/harness-optimizer.md
java-build-resolveragents/java-build-resolver.md
java-revieweragents/java-reviewer.md
kotlin-build-resolveragents/kotlin-build-resolver.md
kotlin-revieweragents/kotlin-reviewer.md
loop-operatoragents/loop-operator.md
planneragents/planner.md
python-revieweragents/python-reviewer.md
pytorch-build-resolveragents/pytorch-build-resolver.md
refactor-cleaneragents/refactor-cleaner.md
rust-build-resolveragents/rust-build-resolver.md
rust-revieweragents/rust-reviewer.md
security-revieweragents/security-reviewer.md
tdd-guideagents/tdd-guide.md
typescript-revieweragents/typescript-reviewer.md
Cargoecc2/Cargo.toml

commands (63)

asidecommands/aside.md
build-fixcommands/build-fix.md
checkpointcommands/checkpoint.md
clawcommands/claw.md
code-reviewcommands/code-review.md
context-budgetcommands/context-budget.md
cpp-buildcommands/cpp-build.md
cpp-reviewcommands/cpp-review.md
cpp-testcommands/cpp-test.md
devfleetcommands/devfleet.md
docscommands/docs.md
e2ecommands/e2e.md
evalcommands/eval.md
evolvecommands/evolve.md
go-buildcommands/go-build.md
go-reviewcommands/go-review.md
go-testcommands/go-test.md
gradle-buildcommands/gradle-build.md
harness-auditcommands/harness-audit.md
instinct-exportcommands/instinct-export.md
instinct-importcommands/instinct-import.md
instinct-statuscommands/instinct-status.md
kotlin-buildcommands/kotlin-build.md
kotlin-reviewcommands/kotlin-review.md
kotlin-testcommands/kotlin-test.md
learn-evalcommands/learn-eval.md
learncommands/learn.md
loop-startcommands/loop-start.md
loop-statuscommands/loop-status.md
model-routecommands/model-route.md
multi-backendcommands/multi-backend.md
multi-executecommands/multi-execute.md
multi-frontendcommands/multi-frontend.md
multi-plancommands/multi-plan.md
multi-workflowcommands/multi-workflow.md
orchestratecommands/orchestrate.md
plancommands/plan.md
pm2commands/pm2.md
projectscommands/projects.md
promotecommands/promote.md
prompt-optimizecommands/prompt-optimize.md
prunecommands/prune.md
python-reviewcommands/python-review.md
quality-gatecommands/quality-gate.md
refactor-cleancommands/refactor-clean.md
resume-sessioncommands/resume-session.md
rules-distillcommands/rules-distill.md
rust-buildcommands/rust-build.md
rust-reviewcommands/rust-review.md
rust-testcommands/rust-test.md
save-sessioncommands/save-session.md
sessionscommands/sessions.md
setup-pmcommands/setup-pm.md
skill-createcommands/skill-create.md
skill-healthcommands/skill-health.md
tddcommands/tdd.md
test-coveragecommands/test-coverage.md
update-codemapscommands/update-codemaps.md
update-docscommands/update-docs.md
verifycommands/verify.md
add-language-rules.claude/commands/add-language-rules.md
database-migration.claude/commands/database-migration.md
feature-development.claude/commands/feature-development.md

hooks (1)

hookshooks/hooks.json

scripts (138)

commitlint.configcommitlint.config.js
eslint.configeslint.config.js
installinstall.sh
catalogscripts/catalog.js
catalogscripts/ci/catalog.js
validate-agentsscripts/ci/validate-agents.js
validate-commandsscripts/ci/validate-commands.js
validate-hooksscripts/ci/validate-hooks.js
validate-install-manifestsscripts/ci/validate-install-manifests.js
validate-no-personal-pathsscripts/ci/validate-no-personal-paths.js
validate-rulesscripts/ci/validate-rules.js
validate-skillsscripts/ci/validate-skills.js
clawscripts/claw.js
check-codex-global-statescripts/codex/check-codex-global-state.sh
install-global-git-hooksscripts/codex/install-global-git-hooks.sh
merge-mcp-configscripts/codex/merge-mcp-config.js
pre-commitscripts/codex-git-hooks/pre-commit
pre-pushscripts/codex-git-hooks/pre-push
doctorscripts/doctor.js
eccscripts/ecc.js
harness-auditscripts/harness-audit.js
auto-tmux-devscripts/hooks/auto-tmux-dev.js
check-console-logscripts/hooks/check-console-log.js
check-hook-enabledscripts/hooks/check-hook-enabled.js
config-protectionscripts/hooks/config-protection.js
cost-trackerscripts/hooks/cost-tracker.js
desktop-notifyscripts/hooks/desktop-notify.js
doc-file-warningscripts/hooks/doc-file-warning.js
evaluate-sessionscripts/hooks/evaluate-session.js
governance-capturescripts/hooks/governance-capture.js
insaits-security-monitorscripts/hooks/insaits-security-monitor.py
insaits-security-wrapperscripts/hooks/insaits-security-wrapper.js
mcp-health-checkscripts/hooks/mcp-health-check.js
post-bash-build-completescripts/hooks/post-bash-build-complete.js
post-bash-pr-createdscripts/hooks/post-bash-pr-created.js
post-edit-console-warnscripts/hooks/post-edit-console-warn.js
post-edit-formatscripts/hooks/post-edit-format.js
post-edit-typecheckscripts/hooks/post-edit-typecheck.js
pre-bash-dev-server-blockscripts/hooks/pre-bash-dev-server-block.js
pre-bash-git-push-reminderscripts/hooks/pre-bash-git-push-reminder.js
pre-bash-tmux-reminderscripts/hooks/pre-bash-tmux-reminder.js
pre-compactscripts/hooks/pre-compact.js
pre-write-doc-warnscripts/hooks/pre-write-doc-warn.js
quality-gatescripts/hooks/quality-gate.js
run-with-flags-shellscripts/hooks/run-with-flags-shell.sh
run-with-flagsscripts/hooks/run-with-flags.js
session-end-markerscripts/hooks/session-end-marker.js
session-endscripts/hooks/session-end.js
session-startscripts/hooks/session-start.js
suggest-compactscripts/hooks/suggest-compact.js
install-applyscripts/install-apply.js
install-planscripts/install-plan.js
agent-compressscripts/lib/agent-compress.js
hook-flagsscripts/lib/hook-flags.js
inspectionscripts/lib/inspection.js
applyscripts/lib/install/apply.js
configscripts/lib/install/config.js
requestscripts/lib/install/request.js
runtimescripts/lib/install/runtime.js
install-executorscripts/lib/install-executor.js
install-lifecyclescripts/lib/install-lifecycle.js
install-manifestsscripts/lib/install-manifests.js
install-statescripts/lib/install-state.js
antigravity-projectscripts/lib/install-targets/antigravity-project.js
claude-homescripts/lib/install-targets/claude-home.js
codex-homescripts/lib/install-targets/codex-home.js
cursor-projectscripts/lib/install-targets/cursor-project.js
helpersscripts/lib/install-targets/helpers.js
opencode-homescripts/lib/install-targets/opencode-home.js
registryscripts/lib/install-targets/registry.js
orchestration-sessionscripts/lib/orchestration-session.js
package-managerscripts/lib/package-manager.js
project-detectscripts/lib/project-detect.js
resolve-ecc-rootscripts/lib/resolve-ecc-root.js
resolve-formatterscripts/lib/resolve-formatter.js
canonical-sessionscripts/lib/session-adapters/canonical-session.js
claude-historyscripts/lib/session-adapters/claude-history.js
dmux-tmuxscripts/lib/session-adapters/dmux-tmux.js
registryscripts/lib/session-adapters/registry.js
session-aliasesscripts/lib/session-aliases.js
session-managerscripts/lib/session-manager.js
shell-splitscripts/lib/shell-split.js
dashboardscripts/lib/skill-evolution/dashboard.js
healthscripts/lib/skill-evolution/health.js
indexscripts/lib/skill-evolution/index.js
provenancescripts/lib/skill-evolution/provenance.js
trackerscripts/lib/skill-evolution/tracker.js
versioningscripts/lib/skill-evolution/versioning.js
amendifyscripts/lib/skill-improvement/amendify.js
evaluatescripts/lib/skill-improvement/evaluate.js
healthscripts/lib/skill-improvement/health.js
observationsscripts/lib/skill-improvement/observations.js
indexscripts/lib/state-store/index.js
migrationsscripts/lib/state-store/migrations.js
queriesscripts/lib/state-store/queries.js
schemascripts/lib/state-store/schema.js
tmux-worktree-orchestratorscripts/lib/tmux-worktree-orchestrator.js
utilsscripts/lib/utils.js
list-installedscripts/list-installed.js
orchestrate-codex-workerscripts/orchestrate-codex-worker.sh
orchestrate-worktreesscripts/orchestrate-worktrees.js
orchestration-statusscripts/orchestration-status.js
releasescripts/release.sh
repairscripts/repair.js
session-inspectscripts/session-inspect.js
sessions-cliscripts/sessions-cli.js
setup-package-managerscripts/setup-package-manager.js
skill-create-outputscripts/skill-create-output.js
skills-healthscripts/skills-health.js
statusscripts/status.js
sync-ecc-to-codexscripts/sync-ecc-to-codex.sh
uninstallscripts/uninstall.js
evaluate-sessionskills/continuous-learning/evaluate-session.sh
observer-loopskills/continuous-learning-v2/agents/observer-loop.sh
session-guardianskills/continuous-learning-v2/agents/session-guardian.sh
start-observerskills/continuous-learning-v2/agents/start-observer.sh
observeskills/continuous-learning-v2/hooks/observe.sh
detect-projectskills/continuous-learning-v2/scripts/detect-project.sh
instinct-cliskills/continuous-learning-v2/scripts/instinct-cli.py
test_parse_instinctskills/continuous-learning-v2/scripts/test_parse_instinct.py
scan-rulesskills/rules-distill/scripts/scan-rules.sh
scan-skillsskills/rules-distill/scripts/scan-skills.sh
classifierskills/skill-comply/scripts/classifier.py
graderskills/skill-comply/scripts/grader.py
parserskills/skill-comply/scripts/parser.py
reportskills/skill-comply/scripts/report.py
runskills/skill-comply/scripts/run.py
runnerskills/skill-comply/scripts/runner.py
scenario_generatorskills/skill-comply/scripts/scenario_generator.py
spec_generatorskills/skill-comply/scripts/spec_generator.py
utilsskills/skill-comply/scripts/utils.py
__init__skills/skill-comply/scripts/__init__.py
quick-diffskills/skill-stocktake/scripts/quick-diff.sh
save-resultsskills/skill-stocktake/scripts/save-results.sh
scanskills/skill-stocktake/scripts/scan.sh
suggest-compactskills/strategic-compact/suggest-compact.sh
ws_listenerskills/videodb/scripts/ws_listener.py
VERSIONVERSION

Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use


Interface

Aggregated instruction summary

Instructions: 27787Files: 126Format: composite

Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

yes

deletes files

no

modifies files

yes

accesses env variables

yes

invokes external tools

yes

makes network requests

no


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Verified badge for everything-claude-code
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

publisher

Publisher "Affaan Mustafa" is not verified — first certification from this publisher

provenance

Single contributor — no peer review evidence in commit history

provenance

Repository is 0 days old — recently created


Signed Artifact

Certification provenance and verification metadata

Content hashsha256:5a10139fea54a7a795c08eec22ed8bd32e16f0f04ea8926e2e5f0f444b608b10
Key IDkms-9db4ed3b9f53
CertifiedMar 28, 2026
ExpiresMar 28, 2027
Pipeline version1.0
Statusvalid