Every helper shows its safety status.
We label each helper so you know what you're adding. Verified helpers passed our safety checks. Scanned helpers passed automated checks. Awaiting-review helpers are new — use them carefully until review completes.
Updated 5/6/2026, 4:54:50 AM.
Security status breakdown
How we audit every skill
Four independent checks — every skill, every time.
Malware scan
Every skill is scanned against a deny-list of malicious shell commands, credential-exfiltration patterns, and obfuscated payloads.
Permission audit
We verify that the permissions a skill requests (filesystem access, network calls, shell exec) match the behavior it declares in plain English.
Content review
A human reads every approved skill to confirm the instructions are safe, clear, and actually do what the title claims.
Prompt-injection resilience
We test against known prompt-injection vectors — external web content, cross-skill interference, instruction override attempts.
Found something suspicious?
We treat every security report as high-priority. Responsible disclosures are acknowledged within one business day and published here once fixed.