security-scanner
Detects vulnerabilities and malware in code, providing risk assessments and actionable recommendations for secure installations.
Install this skill
Security score
The security-scanner skill was audited on Feb 9, 2026 and we found 29 security issues across 5 threat categories, including 7 critical. Review the findings below before installing.
Categories Tested
Security Issues
Direct command execution function call
| 45 | - `exec()` - Command execution |
Direct command execution function call
| 73 | - ✗ `exec()` |
Direct command execution function call
| 189 | ### eval() / exec() |
Eval function call - arbitrary code execution
| 29 | security-scanner --code "eval(userInput)" |
Eval function call - arbitrary code execution
| 44 | - `eval()` - Arbitrary code execution |
Eval function call - arbitrary code execution
| 72 | - ✗ `eval()` |
Eval function call - arbitrary code execution
| 189 | ### eval() / exec() |
Eval function call - arbitrary code execution
| 190 | **Finding:** "eval() allows arbitrary code execution" |
Eval function call - arbitrary code execution
| 285 | security-scanner --code "eval(userInput)" |
Node child_process module reference
| 55 | - `child_process` calls (spawning external commands) |
Node child_process module reference
| 75 | - ⚠ `child_process` module imports |
Node child_process module reference
| 110 | Line 42: [CAUTION] child_process allows spawning external commands |
Node child_process module reference
| 111 | Code: require('child_process') |
Node child_process module reference
| 112 | Context: const spawn = require('child_process').spawn; |
Node child_process module reference
| 198 | ### child_process Import |
Node child_process module reference
| 199 | **Finding:** "child_process allows spawning external commands" |
Fetch to external URL
| 116 | Code: fetch('https://api.example.com/verify') |
Fetch to external URL
| 117 | Context: return fetch('https://api.example.com/verify', {...}) |
Fetch to external URL
| 236 | - ✅ `fetch('https://api.github.com/...')` → Normal |
Fetch to external URL
| 237 | - ❌ `fetch('https://malware-collection.ru/...')` → Dangerous |
Access to .env file
| 78 | - ✗ `process.env.SECRET`, `process.env.API_KEY`, etc. |
Access to .env file
| 79 | - ⚠ Dynamic environment variable access `process.env[varName]` |
Access to .env file
| 208 | ### process.env.API_KEY |
Hex-encoded characters
| 89 | - ⚠ Hex-encoded strings (`\x41\x42\x43`) |
Unicode escape sequences
| 90 | - ⚠ Unicode-encoded strings (`\u0041\u0042`) |
External URL reference
| 116 | Code: fetch('https://api.example.com/verify') |
External URL reference
| 117 | Context: return fetch('https://api.example.com/verify', {...}) |
External URL reference
| 236 | - ✅ `fetch('https://api.github.com/...')` → Normal |
External URL reference
| 237 | - ❌ `fetch('https://malware-collection.ru/...')` → Dangerous |