Skip to main content

Standalone AI skill security scanner — detects prompt injection, tool poisoning, and supply-chain attacks in MCP skills

Project description

CI CodeQL PyPI Docker Hub License Python

Free. Private. Offline. No API key required.

Security scanner for AI agent skills and MCP tool bundles. Part of the SkillScan project.

SkillScan Security catches the obvious stuff so you don't have to pay Claude to find it. It runs entirely on your machine — no network calls, no telemetry, no tokens spent — and returns deterministic verdicts before you ever send a skill to an online scanner.

Use it as a free pre-filter in your CI pipeline. If it blocks, you know immediately. If it passes, you've already eliminated the easy wins before handing off to a deeper (and more expensive) analysis layer.

Verdicts: allow · warn · block

Default policy: strict.


Why SkillScan First

Online AI scanners (Invariant, Lakera Guard, and others) are excellent at nuanced intent analysis. They are also billed per token. Running them on every skill in a large repository is expensive.

SkillScan handles the deterministic layer for free:

  • Download-and-execute chains
  • Secret exfiltration patterns
  • Credential harvesting instructions
  • Malicious binary artifacts
  • Known-bad IOC domains and IPs
  • Vulnerable dependency versions
  • Prompt injection and instruction override attempts
  • Social engineering credential requests

If SkillScan blocks it, you don't need to spend tokens on it. If it passes, you have a clean bill of health on the obvious vectors before your paid scanner runs.


Features

  1. Offline-first. No network calls required. Runs entirely on your machine.
  2. Archive-safe extraction and static analysis.
  3. Binary artifact classification and flagging (executables, libraries, bytecode, blobs).
  4. Malware and instruction-abuse pattern detection (70+ static rules, 15 chain rules).
  5. Instruction hardening pipeline (Unicode normalization, zero-width stripping, bounded base64 decode, action-chain checks).
  6. IOC extraction with local intel matching (163 domains, 1,310 IPs, 2 CIDRs — updated twice daily).
  7. Dependency vulnerability checks (23 Python + 4 npm packages via OSV.dev).
  8. Social engineering and credential-harvest instruction detection (SE-001, SE-SEM-001).
  9. Policy profiles (strict, balanced, permissive) + custom policies.
  10. Pretty terminal output + JSON / SARIF / JUnit / compact reports.
  11. Auto-refresh managed intel feeds (default checks every scan, 1-hour max age).
  12. Versioned YAML rulepack for flexible detection updates.
  13. Adversarial regression corpus with expected verdicts.
  14. Default-on local semantic prompt-injection classifier (NLTK/classical features, no external API).
  15. Optional offline ML detection (--ml-detect) using a fine-tuned DeBERTa adapter — no API key, no cloud.

Distribution Status

  • PyPI: pip install skillscan-security
  • Docker: docker pull kurtpayne/skillscan-security
  • Pre-commit hook: skillscan-security>=0.3.1

Release process: docs/RELEASE_CHECKLIST.md and docs/RELEASE_ONBOARDING.md.

SBOMs: Python CycloneDX (sbom-python.cdx.json) and Docker SPDX (sbom-docker.spdx.json) are included in release artifacts.

Docker default behavior: the image includes ClamAV and enables it by default (SKILLSCAN_CLAMAV=true). Override with --no-clamav.


Install

Option A: convenience installer

curl -fsSL https://raw.githubusercontent.com/kurtpayne/skillscan/main/scripts/install.sh | bash

Option B: pip

pip install skillscan-security

Base install is ~25 MB. No torch, no transformers, no heavy ML stack. The --ml-detect flag requires an optional extra:

# CPU-only ONNX inference (~200 MB) — recommended for most users
pip install 'skillscan-security[ml-onnx]'

# Full PyTorch backend (~500 MB) — for GPU environments
pip install 'skillscan-security[ml]'

Option C: local/dev install

python3 -m venv .venv
source .venv/bin/activate
pip install -e '.[dev]'

Quick Start

skillscan scan ./examples/suspicious_skill

Scan directly from URL (including GitHub blob URLs):

skillscan scan "https://github.com/blader/humanizer/blob/main/SKILL.md?plain=1"

Save reports:

# JSON
skillscan scan ./target --format json --out report.json --fail-on never
# SARIF (GitHub code scanning)
skillscan scan ./target --format sarif --out skillscan.sarif --fail-on never
# JUnit XML (CI test report ingestion)
skillscan scan ./target --format junit --out skillscan-junit.xml --fail-on never
# Compact (terse CI logs)
skillscan scan ./target --format compact --fail-on never

Render a saved report:

skillscan explain ./report.json

Optional offline ML detection (requires [ml-onnx] or [ml] extra):

skillscan scan ./target --ml-detect

The ML detector uses a fine-tuned DeBERTa adapter. It runs entirely on your machine — no API calls, no tokens, no cloud. It is the right tool for subtle semantic attacks that the static rules don't catch. For nuanced intent analysis that requires reasoning about context, see the integration bridges below.


Highlighted Examples

1. Download-and-execute chain (critical)

$ skillscan scan examples/showcase/01_download_execute --fail-on never
╭─────────────────────────────── Verdict: BLOCK ───────────────────────────────╮
│ Target: examples/showcase/01_download_execute                                │
│ Policy: strict                                                               │
│ Score: 360                                                                   │
│ Findings: 2                                                                  │
╰──────────────────────────────────────────────────────────────────────────────╯
Top Findings:
- MAL-001 (critical) Download-and-execute chain
- CHN-001 (critical) Dangerous action chain: download plus execute

2. Secret exfiltration chain (critical)

$ skillscan scan examples/showcase/15_secret_network_chain --fail-on never
╭─────────────────────────────── Verdict: BLOCK ───────────────────────────────╮
│ Target: examples/showcase/15_secret_network_chain                            │
│ Policy: strict                                                               │
│ Score: 285                                                                   │
│ Findings: 2                                                                  │
╰──────────────────────────────────────────────────────────────────────────────╯
Top Findings:
- EXF-001 (high) Sensitive credential file access
- CHN-002 (critical) Potential secret exfiltration chain

3. Social engineering credential harvest (critical)

$ skillscan scan examples/showcase/20_social_engineering_credential_harvest --fail-on never
╭─────────────────────────────── Verdict: BLOCK ───────────────────────────────╮
│ Target: examples/showcase/20_social_engineering_credential_harvest           │
│ Policy: strict                                                               │
│ Score: 95                                                                    │
│ Findings: 2                                                                  │
╰──────────────────────────────────────────────────────────────────────────────╯
Top Findings:
- SE-001 (high) Social engineering credential harvest
- PINJ-SEM-001 (medium) Semantic prompt injection signal

4. npm lifecycle supply-chain abuse

$ skillscan scan examples/showcase/21_npm_lifecycle_abuse --fail-on never
╭─────────────────────────────── Verdict: BLOCK ───────────────────────────────╮
│ Target: examples/showcase/21_npm_lifecycle_abuse                             │
│ Policy: strict                                                               │
│ Score: 465                                                                   │
│ Findings: 3                                                                  │
╰──────────────────────────────────────────────────────────────────────────────╯
Top Findings:
- MAL-001 (critical) Download-and-execute chain
- CHN-001 (critical) Dangerous action chain: download plus execute
- SUP-001 (high) Risky npm lifecycle script: preinstall

5. Executable binary artifact detection

$ skillscan scan examples/showcase/24_binary_artifact --fail-on never
╭─────────────────────────────── Verdict: WARN ────────────────────────────────╮
│ Target: examples/showcase/24_binary_artifact                                 │
│ Policy: strict                                                               │
│ Score: 35                                                                    │
│ Findings: 1                                                                  │
╰──────────────────────────────────────────────────────────────────────────────╯
Top Findings:
- BIN-001 (high) Executable binary artifact present

Command Summary

  • skillscan scan <path>
  • skillscan explain <report.json>
  • skillscan policy show-default --profile strict|balanced|permissive
  • skillscan policy validate <policy.yaml>
  • skillscan intel status|list|add|remove|enable|disable|rebuild
  • skillscan intel sync [--force]
  • skillscan rule list [--format json]
  • skillscan uninstall [--keep-data]
  • skillscan-security version

See full command docs: docs/COMMANDS.md.


Policies

Built-ins:

  1. strict (default)
  2. balanced
  3. permissive

Use a custom policy:

skillscan scan ./target --policy ./examples/policies/strict_custom.yaml

Intel Management

Add a local IOC source:

skillscan intel add ./examples/intel/custom_iocs.json --type ioc --name team-iocs

View sources:

skillscan intel status
skillscan intel list

Managed intel auto-refresh runs by default on scan. You can tune or disable it:

skillscan scan ./target --intel-max-age-minutes 60
skillscan scan ./target --no-auto-intel
skillscan intel sync --force

Integration Bridges

SkillScan is designed to be the free pre-filter in a layered scanning pipeline. It handles deterministic checks locally so you don't spend tokens on the obvious cases. For nuanced intent analysis, pair it with an online scanner.

Use SkillScan as a pre-filter for Invariant

Invariant Analyzer provides deep semantic analysis of agent traces and skill files. Run SkillScan first to eliminate clear-cut cases:

# Only send to Invariant if SkillScan doesn't block
skillscan scan ./skill --format json --out pre-filter.json --fail-on never
if [ "$(jq -r '.verdict' pre-filter.json)" != "block" ]; then
  invariant analyze ./skill
fi

Or in CI:

- name: SkillScan pre-filter
  run: skillscan scan ./skills --format sarif --out skillscan.sarif
  continue-on-error: true

- name: Upload SkillScan results
  uses: github/codeql-action/upload-sarif@v3
  with:
    sarif_file: skillscan.sarif

- name: Deep scan (only if SkillScan passes)
  if: steps.skillscan.outcome == 'success'
  run: invariant analyze ./skills

Use SkillScan as a pre-filter for Lakera Guard

Lakera Guard provides real-time prompt injection detection via API. SkillScan catches the static patterns for free before you hit the API:

import subprocess, json, requests

result = subprocess.run(
    ["skillscan", "scan", skill_path, "--format", "json", "--fail-on", "never"],
    capture_output=True, text=True
)
report = json.loads(result.stdout)

if report["verdict"] == "block":
    # SkillScan caught it — no API call needed
    raise ValueError(f"Skill blocked by SkillScan: {report['top_findings']}")

# SkillScan passed — send to Lakera for semantic analysis
response = requests.post(
    "https://api.lakera.ai/v1/prompt_injection",
    headers={"Authorization": f"Bearer {LAKERA_API_KEY}"},
    json={"input": skill_content}
)

Pre-commit hook

# .pre-commit-config.yaml
repos:
  - repo: https://github.com/kurtpayne/skillscan-security
    rev: v0.3.1
    hooks:
      - id: skillscan
        args: [--fail-on, warn]

Example Fixtures

  1. Benign sample: examples/benign_skill
  2. Suspicious sample: examples/suspicious_skill
  3. OpenAI-style sample: examples/openai_style_tool
  4. Claude-style sample: examples/claude_style_skill
  5. Comprehensive detection showcase: examples/showcase/INDEX.md
  6. Social engineering sample: examples/showcase/20_social_engineering_credential_harvest
  7. OpenClaw-compromised-style sample: tests/fixtures/malicious/openclaw_compromised_like

Cross-Platform Skill Bundles

Starter bundles for OpenClaw/ClawHub, Claude-style skills, and OpenAI Actions are in:

  • integrations/openclaw/
  • integrations/claude/
  • integrations/openai/

See the Platform Bundles section of the Distribution Guide for setup and rollout guidance.


Testing

./scripts/run_tests.sh test
./scripts/run_tests.sh lint
./scripts/run_tests.sh type
./scripts/run_tests.sh check

Or via Makefile:

make check

CI/CD Integration

SkillScan provides a reusable GitHub Actions workflow for scanning skill artifacts in CI pipelines with native SARIF upload to the GitHub Security tab.

jobs:
  skillscan:
    uses: kurtpayne/skillscan-security/.github/workflows/skillscan-scan.yml@main
    with:
      scan-path: ./skills

See docs/GITHUB_ACTIONS.md for full documentation and examples.


Uninstall

skillscan uninstall
# Keep local data (intel/reports/config):
skillscan uninstall --keep-data

Shell script uninstall: scripts/uninstall.sh.


Documentation

  • Detection model: docs/DETECTION_MODEL.md
  • Scan overview: docs/SCAN_OVERVIEW.md
  • Architecture: docs/ARCHITECTURE.md
  • Threat model: docs/THREAT_MODEL.md
  • Policy guide: docs/POLICY.md
  • Intel guide: docs/INTEL.md
  • Testing guide: docs/TESTING.md
  • Rules and scoring: docs/RULES.md
  • Comprehensive examples: docs/EXAMPLES.md
  • GitHub Actions integration: docs/GITHUB_ACTIONS.md
  • Distribution: docs/DISTRIBUTION.md
  • Release onboarding: docs/RELEASE_ONBOARDING.md
  • Release checklist: docs/RELEASE_CHECKLIST.md
  • PRD: docs/PRD.md

Related

  • skillscan-lint — Quality linter for AI agent skills: readability, clarity, graph integrity
  • Invariant Analyzer — Deep semantic analysis of agent traces; use SkillScan as a free pre-filter
  • Lakera Guard — Real-time prompt injection detection API; use SkillScan to eliminate static cases before hitting the API
  • skills.sh — Community registry of AI agent skills
  • ClawHub — MCP skill marketplace
  • Docker Hubdocker pull kurtpayne/skillscan-security
  • PyPIpip install skillscan-security

License

Licensed under Apache-2.0. See LICENSE.

Security Note

SkillScan performs static analysis by default and does not execute scanned artifacts. For untrusted inputs, run in a trusted isolated environment.

For URL scans, unreadable linked sources are reported as low-severity SRC-READ-ERR findings. They are flagged for review but are not treated as malicious by default.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

skillscan_security-0.7.0.tar.gz (230.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

skillscan_security-0.7.0-py3-none-any.whl (179.6 kB view details)

Uploaded Python 3

File details

Details for the file skillscan_security-0.7.0.tar.gz.

File metadata

  • Download URL: skillscan_security-0.7.0.tar.gz
  • Upload date:
  • Size: 230.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for skillscan_security-0.7.0.tar.gz
Algorithm Hash digest
SHA256 50cfaef7d36bf3d41078dea02102b3f366f72350bfebd41709d84ac446701b50
MD5 8c69713739c8738508f819e939eee06f
BLAKE2b-256 dc4a41b1b7113c0a617ba70aa53ccc6bfafe6e99c094f030da53f60ab7582cff

See more details on using hashes here.

Provenance

The following attestation bundles were made for skillscan_security-0.7.0.tar.gz:

Publisher: release-pypi.yml on kurtpayne/skillscan-security

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file skillscan_security-0.7.0-py3-none-any.whl.

File metadata

File hashes

Hashes for skillscan_security-0.7.0-py3-none-any.whl
Algorithm Hash digest
SHA256 6a192860086e3fb4070709820639c63b6e765596794c61d066657ae611c36250
MD5 f0457b987fa4778ff638db139ee2e117
BLAKE2b-256 fae3ff9409a24599bb65369719eff83fb1a0992b02c538eebdc45d5d9aa38730

See more details on using hashes here.

Provenance

The following attestation bundles were made for skillscan_security-0.7.0-py3-none-any.whl:

Publisher: release-pypi.yml on kurtpayne/skillscan-security

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page