01Detection of dangerous code patterns like shell execution and obfuscation
02Systematic extraction and auditing of .skill file components
03Integration with security pattern references for consistent risk evaluation
04Comprehensive security checklist covering network access, PII, and permissions
05Severity-rated findings list categorized from critical threats to positive practices
066 GitHub stars