Security Check
Pre-installation security verification for external code and dependencies.
Core Principle
Always verify before you download. External code (GitHub repos, npm packages, PyPI libraries, scripts) can contain malicious code, vulnerabilities, or supply chain attacks. This skill automates security checks before executing potentially dangerous commands.
When to Use
Automatically trigger security check before:
git clone <url>โ GitHub/GitLab repositoriespip install <package>โ Python packagesnpm install <package>โ Node packagescurl <url> | bashโ Shell scripts- Downloading any external code for execution
How It Works
1. Detect Source Type
Identify what's being installed:
- GitHub URL โ Repository check
- PyPI package name โ Package check
- npm package name โ Package check
- Direct URL โ Script/file check
2. Gather Security Metrics
Based on source type, collect:
For GitHub repos:
- Stars, forks, watchers
- Last commit date
- Open issues (especially
securitylabels) - Contributors count
- License type
- Code of Conduct presence
For PyPI packages:
- Downloads per month
- Release frequency
- Maintainer info
- Known CVEs (via safety DB)
- Dependencies count
For npm packages:
- Weekly downloads
- Dependencies count (fewer is better)
- Link to source code
- License
- Known vulnerabilities (Snyk)
3. Calculate Risk Score
Use threshold-based scoring (inspired by Skantek):
Risk Score = 0
# Positive signals (reduce risk):
- High stars/downloads: -10
- Recent activity (< 30 days): -5
- Well-known maintainer: -5
- Clear license: -3
- Few dependencies: -5
# Negative signals (increase risk):
- No activity (> 1 year): +15
- No license: +10
- Many dependencies: +5 per 10 deps
- Known CVEs: +20 per CVE
- Suspicious patterns: +25
Risk Levels:
Score < 0โ โ Safe (proceed automatically)0 <= Score < 15โ โ ๏ธ Review (show summary, ask confirmation)Score >= 15โ โ Dangerous (strong warning, manual approval required)
4. Show Summary
Present findings:
๐ Security Check: <package/repo>
Risk Level: โ ๏ธ REVIEW
Metrics:
โ
Stars: 15.2k | Forks: 3.1k
โ ๏ธ Last commit: 8 months ago
โ
License: MIT
โ ๏ธ Open security issues: 2
โ
Dependencies: 5
Known Issues:
- CVE-2024-12345 (Medium severity, patched in v1.2.3)
Recommendation: Update to v1.2.3+ before installing.
Proceed? [Y/n]
5. Request Confirmation
Based on risk level:
- โ Safe โ Inform user, proceed automatically (unless user explicitly wants review)
- โ ๏ธ Review โ Show summary, ask confirmation
- โ Dangerous โ Strong warning, require explicit approval
Implementation Pattern
# Before: git clone https://github.com/user/repo
# After:
1. Detect: GitHub repo
2. Fetch metrics via GitHub API
3. Calculate risk score
4. Show summary
5. Ask confirmation if needed
6. Proceed or abort
Integration Points
GitHub API
curl -s "https://api.github.com/repos/{owner}/{repo}"
Returns: stars, forks, updated_at, open_issues_count, license
PyPI JSON API
curl -s "https://pypi.org/pypi/{package}/json"
Returns: downloads, releases, maintainers
npm Registry
curl -s "https://registry.npmjs.org/{package}"
Returns: downloads (via npm-stat), dependencies, license
Vulnerability Databases
- Snyk (npm): https://security.snyk.io
- Safety DB (Python): https://github.com/pyupio/safety-db
- GitHub Advisory: https://github.com/advisories
Best Practices from Research
Based on Adyen's Skantek and GitHub's Dependabot:
- Use fewer dependencies โ Each dependency multiplies risk
- Regular rescanning โ Zero-day exploits need monitoring
- Private registry โ For approved packages (optional)
- Threshold-based โ Not binary safe/unsafe, but risk spectrum
- Compatibility scores โ Check if update breaks CI tests
Guardrails
- Never bypass without user knowledge โ Always inform about security checks
- Never auto-install flagged packages โ Require manual approval for high-risk
- Log all decisions โ Track what was installed and why
- Rate limit API calls โ GitHub/npm/PyPI have rate limits
Example Workflows
Example 1: Safe Package
User: pip install requests
Security Check:
โ
SAFE: requests (PyPI)
- Downloads: 50M/month
- Last release: 2 weeks ago
- License: Apache 2.0
- Dependencies: 5
- Known CVEs: 0
Proceeding with installation...
Example 2: Risky Repo
User: git clone https://github.com/suspicious/tool
Security Check:
โ DANGEROUS: suspicious/tool
- Stars: 12
- Last commit: 3 years ago
- Open issues: 45 (3 security labels)
- No license
- Risk score: 35
โ ๏ธ This repository shows multiple red flags.
Consider alternatives or manual code review.
Proceed anyway? [y/N]
Example 3: Update Needed
User: npm install left-pad
Security Check:
โ ๏ธ REVIEW: left-pad@1.0.0
- Downloads: 2M/week
- CVE-2024-xxxxx: Prototype pollution (High)
- Fixed in: v1.0.1
Recommendation: Install v1.0.1 instead.
Use latest version? [Y/n]
Future Enhancements
When skill matures:
- Local cache โ Cache risk scores for 24h to reduce API calls
- Pattern detection โ Scan code for suspicious patterns (eval, exec, shell commands)
- CI/CD integration โ Block deployments with vulnerable dependencies
- Custom rules โ User-defined thresholds and blocklists
- Reports โ Generate security audit logs
References
For detailed implementation guidance:
- See
references/skantek-approach.mdโ Adyen's methodology - See
references/vulnerability-databases.mdโ How to query CVE databases