Every skill, security-vetted
before you install it.
Our audit pipeline blocks malware, validates permissions, and confirms that every skill does exactly what it claims. Live stats, updated every minute.
Updated 4/22/2026, 5:49:05 PM.
Security status breakdown
How we audit every skill
Four independent checks β every skill, every time.
Malware scan
Every skill is scanned against a deny-list of malicious shell commands, credential-exfiltration patterns, and obfuscated payloads.
Permission audit
We verify that the permissions a skill requests (filesystem access, network calls, shell exec) match the behavior it declares in plain English.
Content review
A human reads every approved skill to confirm the instructions are safe, clear, and actually do what the title claims.
Prompt-injection resilience
We test against known prompt-injection vectors β external web content, cross-skill interference, instruction override attempts.
Found something suspicious?
We treat every security report as high-priority. Responsible disclosures are acknowledged within one business day and published here once fixed.