loaditout.ai
SkillsPacksTrendingLeaderboardAPI DocsBlogSubmitRequestsCompareAgentsXPrivacyDisclaimer
{}loaditout.ai
Skills & MCPPacksBlog

agent-skill-scan-mcp

MCP Tool

rexcoleman/agent-skill-scan-mcp

MCP server: Scan OpenClaw SKILL.md and MCP tool definitions for security vulnerabilities. 22 rules. For Claude Code.

Install

$ npx loaditout add rexcoleman/agent-skill-scan-mcp

Platform-specific configuration:

.claude/settings.json
{
  "mcpServers": {
    "agent-skill-scan-mcp": {
      "command": "npx",
      "args": [
        "-y",
        "agent-skill-scan-mcp"
      ]
    }
  }
}

Add the config above to .claude/settings.json under the mcpServers key.

About

agent-skill-scanner MCP Server

> Last updated: 2026-03-31

Scan OpenClaw SKILL.md and Model Context Protocol (MCP) tool definition files for security vulnerabilities — directly from Claude Code.

22 detection rules across prompt injection, capability escalation, data exfiltration, encoded payloads, and composition risks. This is the only scanner targeting agent skill file formats specifically. Generic Static Application Security Testing (SAST) tools produce zero detections on these formats.

Install

Requires Python 3.10+ and the scanner engine:

pip install agent-skill-scanner
Configure in Claude Code

Add to your Claude Code MCP settings:

{
  "mcpServers": {
    "agent-skill-scanner": {
      "command": "python3",
      "args": ["/path/to/agent-skill-scan-mcp/server.py"]
    }
  }
}

Replace /path/to/ with the actual path where you cloned this repo.

Tools
scan_skill_file

Scan a single skill file for security vulnerabilities.

scan_skill_file(file_path="/path/to/SKILL.md")

Returns findings with severity, rule ID, description, and evidence.

scan_directory

Recursively find and scan all agent skill files in a directory.

scan_directory(directory_path="/path/to/skills/")

Returns aggregated findings across all discovered skill files.

What it detects

22 rules across 5 categories:

| Category | Examples | |----------|---------| | Prompt injection | System prompt override, role hijacking, instruction injection | | Capability escalation | Privilege escalation, shell spawning, persistence mechanisms | | Data exfiltration | Credential access, environment variable reads, outbound transfer | | Encoded payloads | Base64 commands, hex payloads, obfuscated strings | | Composition risks | Unrestricted tool chaining, cross-skill data flow, trust violations |

Differentiator

This scanner targets OpenClaw SKILL.md and MCP tool definition formats — markdown-embedded code and YAML

Tags

agent-securityclaude-codemcpmcp-serverprompt-injectionsecurity

Reviews

Loading reviews...

Quality Signals

0
Installs
Last updated17 days ago
Security: AREADME

Safety

Risk Levelmedium
Data Access
read
Network Accessnone

Details

Sourcegithub-crawl
Last commit3/31/2026
View on GitHub→

Embed Badge

[![Loaditout](https://loaditout.ai/api/badge/rexcoleman/agent-skill-scan-mcp)](https://loaditout.ai/skills/rexcoleman/agent-skill-scan-mcp)