detecting-command-injection
Identifies OS command injection vulnerabilities by analyzing unsafe system calls and user input, enhancing security assessments.
Install this skill
or
55/100
Security score
The detecting-command-injection skill was audited on Feb 9, 2026 and we found 3 security issues across 1 threat category, including 3 high-severity. Review the findings below before installing.
Categories Tested
Security Issues
high line 10
System command execution
SourceSKILL.md
| 10 | 1. **Identify command execution points**: Find system(), popen(), execve(), ShellExecute(), CreateProcess() calls |
high line 17
System command execution
SourceSKILL.md
| 17 | - Direct system() with unvalidated user input |
high line 28
System command execution
SourceSKILL.md
| 28 | - **CRITICAL**: Direct use of system() with unvalidated user input |
Scanned on Feb 9, 2026
View Security DashboardGitHub Stars 106
Rate this skill
Categorydevelopment
UpdatedMay 21, 2026
majiayu000/claude-skill-registry