Skip to main content

detecting-command-injection

Identifies OS command injection vulnerabilities by analyzing unsafe system calls and user input, enhancing security assessments.

Install this skill

or
55/100

Security score

The detecting-command-injection skill was audited on Feb 9, 2026 and we found 3 security issues across 1 threat category, including 3 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 10

System command execution

SourceSKILL.md
101. **Identify command execution points**: Find system(), popen(), execve(), ShellExecute(), CreateProcess() calls
high line 17

System command execution

SourceSKILL.md
17- Direct system() with unvalidated user input
high line 28

System command execution

SourceSKILL.md
28- **CRITICAL**: Direct use of system() with unvalidated user input
Scanned on Feb 9, 2026
View Security Dashboard
Installation guide →
GitHub Stars 106
Rate this skill
Categorydevelopment
UpdatedMay 21, 2026
majiayu000/claude-skill-registry