nidhov01-skill-vetterSecurity-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Install via ClawdBot CLI:
clawdbot install nidhov01/nidhov01-skill-vetterGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Potentially destructive shell commands in tool definitions
eval(Uses known external API (expected, informational)
api.github.comAudited Apr 16, 2026 · audit v1.0
Generated Mar 21, 2026
Developers building AI agents that can autonomously install and run third-party skills from repositories like GitHub need to vet each skill for security risks before integration. This ensures the agent doesn't execute malicious code that could compromise user data or system integrity, especially in collaborative or public-facing projects.
Companies deploying AI assistants for internal use, such as automating workflows or accessing sensitive business data, must vet skills to prevent unauthorized access or data leaks. This is critical in industries like finance or healthcare where compliance and security are paramount, ensuring only safe, reviewed skills are installed.
Research institutions using AI agents for experiments or student projects need to vet skills from various sources to avoid introducing vulnerabilities into their systems. This protects academic data and maintains the integrity of research outputs, particularly when testing new or untrusted code in controlled environments.
Consultants offering AI agent customization for clients must vet skills to ensure they don't introduce security flaws that could harm client systems. This builds trust and reliability, especially when integrating skills from unknown authors or repositories, safeguarding against potential legal or reputational risks.
Individuals using AI agents for personal productivity, such as managing files or automating tasks, should vet skills to protect their private information from malicious code. This is essential when installing skills from community sources, preventing unauthorized access to personal documents or credentials.
Offer a subscription-based service where businesses pay for regular vetting of AI agent skills used in their operations. Revenue comes from monthly fees based on the number of skills reviewed, providing ongoing security assessments and compliance reports to mitigate risks in dynamic environments.
Create a platform where developers can list AI agent skills, with a vetting process required for publication. Revenue is generated through listing fees or commissions on sales, ensuring all skills meet security standards and building trust among users who purchase or download from the marketplace.
Provide consulting services to organizations on implementing vetting protocols for their AI agents, along with training workshops for developers. Revenue comes from one-time project fees or hourly rates, helping clients establish internal security practices and reduce reliance on external tools.
💬 Integration Tip
Integrate the vetting protocol into CI/CD pipelines to automatically check skills before deployment, using scripts to fetch and analyze code from repositories for red flags.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.