Skill Detail

Ethical Hacking Methodology

This skill provides documentation on ethical hacking methodology, covering reconnaissance, penetration testing, and reporting.

GitHub:sickn33/antigravity-awesome-skills ethical-hacking-methodology
version ccc1dd504db5
static analysis only
no human review yet
Needs Review

Current public label

Needs Review

Because the skill references credentials and shell commands, it needs review to ensure it is used safely.

This label is currently coming from the automated scorecard.

Automated result

Needs Review

The skill's documentation references credentials and shell commands, including remote access and privilege escalation. The source code appears to be mostly documentation.

2 medium, 2 low Final label: needs review.

Human review

No human review has been recorded yet.

The current public label is still relying on automation. A human has not weighed in yet.

What happened

Driftloom completed a static scan. It inspected the skill files, recorded findings, and generated a scorecard.

Runtime evidence

No sandbox runtime result has been recorded yet.

Driftloom currently recommends runtime testing for this version (priority 40).

What did not happen

  • Driftloom did not run this skill in an isolated sandbox yet.
  • This label is not a guarantee that the skill is safe, bug-free, or appropriate for every environment.
  • A good score does not replace human judgment when a skill touches secrets, shell access, or external systems.

Source provenance

Source: Workspace import

Originally ingested from a local workspace copy.

Scorecard

Safety
64
Quality
94
Transparency
100
Operational
92
Maintenance
70

2 medium, 2 low Final label: needs review.

Severity mix: 2 medium, 2 low

What Driftloom checked

  • Read the skill files and metadata to understand what the skill claims to do.
  • Looked for shell commands and risky command patterns.
  • Looked for external URLs and network behavior.
  • Looked for secret, token, password, and credential references.
  • Checked whether the skill structure and references looked internally consistent.

Findings

Remote access command referenced
shell.remote_access · safety
Medium

The source references remote access or copy commands.

File: SKILL.md
Evidence: ssh
Privilege escalation command referenced
shell.sudo · safety
Medium

The source references sudo. That may be legitimate, but it changes the risk profile.

File: SKILL.md
Evidence: sudo
Documentation-only skill structure
structure.docs_only · quality
Low

The source looks almost entirely documentation-based, with no obvious code or config files to inspect. That does not make it bad, but it limits how much automation can meaningfully verify.

File: SKILL.md
Secret or credential reference detected
secret.reference · safety
Low

The docs mention credentials or secrets. That may be normal, but it still tells you the skill expects sensitive material somewhere in the workflow.

File: SKILL.md
Evidence: password