Security audit reports and analysis of the AI agent skill ecosystem.
ClawSec — Security audit platform | ClawSearch — Safe skill discovery
# Search skills with Trust Score
npx clawsearch slack
# Pre-install security check
npx clawsearch-guard check slack
# Search by author
npx clawsearch @steipete- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category
- Audit Coverage Report
- Skill Category Distribution
- Daily Summary
- Ecosystem Health Index
- Fastest Growing Skills
- High-Risk Authors
- Malicious Skills Exposed — Threat Breakdown
- Most Downloaded Skills — Security Analysis
- Newly Discovered Skills This Week
- Rising Authors — Clean Track Records
- Safest Skills — Recommended Picks
- Sandbox Results — Runtime Behavior
- Top 50 Authors — Trust and Safety Leaderboard
- Suspicious Skills — What to Watch
- Threat Deep Dive — Attack Categories
- Threat Landscape — Attack Patterns
- Top Skills by Category