Alpha Preview: Fidensa is currently in early testing. Scores are for demonstration purposes and are not considered final or reliable.
liatrio-hooks
Provides cross-platform development workflow automation and code quality enforcement through Claude Code hooks integrated with Liatrio's AI prompts configuration.
87
/ 100 · Grade B
B = 80–89
“I need to automate development workflows and enforce code quality standards across different platforms using AI-powered hooks.”
liatrio-hooks earned Certified status with a trust score of 87/100 (Grade B). Adversarial testing produced 2 findings (2 high). Security scan flagged 0 findings.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco Skill Scanner
Adversarial Testing — 6 categories, 2 findings
The skill defines multiple executable command hooks (SessionStart, SessionEnd, PreToolUse, PostToolUse, etc.) that will run external commands, but there are no visible skill instructions or documentation explaining what these hooks do. The hooks execute 'entire hooks claude-code' commands with various parameters, but the behavior and purpose of these commands is not documented in the skill content.
The skill defines multiple hooks that execute 'entire hooks claude-code' commands with various parameters (post-task, pre-task, session-start, etc.). These commands are not declared in the skill's dependencies list, which is empty. The 'entire' command appears to be an external binary or script that gets executed at various lifecycle events, creating an undeclared dependency that bypasses user review.
Methodology v1.0 · 6 categories · ~55 attack patterns
Interface
Skill triggers and instruction summary
Activation
Binds to lifecycle events: PostToolUse, PreToolUse, SessionEnd, SessionStart, Stop, UserPromptSubmit
Hook configuration with 7 handler(s)
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
no
no
no
no
yes
no
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "liatrio-labs" is not verified — first certification from this publisher
Single contributor — no peer review evidence in commit history
Package description appears to be boilerplate or template text
Signed Artifact
Certification provenance and verification metadata
The original instruction file with a certification footer appended. Replace the source file in your project so AI agents see the trust score, verification link, and SOP.
ES256-signed JWS artifact for programmatic verification. Use with the Fidensa MCP server or GitHub Action to validate integrity.
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.