18 defensive scanners that vet a repo, skill, MCP server, or plugin for prompt injection, secrets, lifecycle hooks, typosquats, and tamper traces before you install.
Repo-forensics is a defensive audit tool aimed at the 'nobody does it' problem: vetting third-party code before installing it with full system access. 18 parallel scanners cover runtime dynamism, manifest drift, prompt-injection in SKILL.md, MCP tool poisoning, DAST of hook scripts, secrets, SAST, AST analysis, dependency typosquats, lifecycle hooks, entropy payloads, IaC misconfigs, binary disguises, post-incident traces, and git-commit spoofing. Zero deps.
Use repo-forensics. Scan https://github.com/<author>/<skill> with the skill_threats, secrets, dataflow, and lifecycle scanners. Report findings.✓ Kopiert
→ Per-scanner report with severity flags
Read correlated findings
Any correlations across scanners — e.g. a secret-leak path plus a lifecycle hook?✓ Kopiert
→ Correlation summary
Ergebnis: A go / no-go decision grounded in scanner output, not vibes.
Fallstricke
Trusting a green scan as full proof of safety — Scanners are strong floor, not a ceiling — still read SKILL.md