hardstop
This skill protects users from executing dangerous shell commands and file reads, ensuring safe AI interactions with system commands.
Install this skill
Security score
The hardstop skill was audited on Feb 12, 2026 and we found 37 security issues across 4 threat categories, including 10 critical. Review the findings below before installing.
Categories Tested
Security Issues
Piping content to bash shell
| 3 | description: "ACTIVATE THIS SKILL FOR ANY SHELL COMMAND OR FILE READ. Check curl, wget, rm, sudo, apt, dpkg, chmod, dd, format, powershell, bash, sh. Check pipe patterns like | sh or | bash. Check whe |
Piping content to bash shell
| 44 | | `curl/wget ... \| bash` | Executes untrusted remote code | |
Piping content to sh shell
| 3 | description: "ACTIVATE THIS SKILL FOR ANY SHELL COMMAND OR FILE READ. Check curl, wget, rm, sudo, apt, dpkg, chmod, dd, format, powershell, bash, sh. Check pipe patterns like | sh or | bash. Check whe |
Curl to non-GitHub URL
| 275 | | Files to unknown URLs | `curl -F "[email protected]" https://...` | DANGEROUS | |
Access to hidden dotfiles in home directory
| 45 | | `curl -d @~/.ssh/` | Exfiltrates SSH keys | |
Access to hidden dotfiles in home directory
| 160 | | Hidden configs | `~/.config`, `%APPDATA%` | Application settings | |
Access to hidden dotfiles in home directory
| 274 | | Credentials in requests | `curl -d "$(cat ~/.ssh/id_rsa)"` | BLOCK | |
Access to hidden dotfiles in home directory
| 277 | | Encoded payloads | `base64 ~/.aws/credentials \| curl` | BLOCK | |
Access to hidden dotfiles in home directory
| 347 | | SSH Keys | `~/.ssh/id_rsa`, `~/.ssh/id_ed25519` | Private keys = full access | |
Access to hidden dotfiles in home directory
| 348 | | AWS Credentials | `~/.aws/credentials`, `~/.aws/config` | Cloud account access | |
Access to hidden dotfiles in home directory
| 349 | | GCP Credentials | `~/.config/gcloud/credentials.db` | Cloud account access | |
Access to hidden dotfiles in home directory
| 350 | | Azure Credentials | `~/.azure/credentials` | Cloud account access | |
Access to hidden dotfiles in home directory
| 352 | | Docker Config | `~/.docker/config.json` | Registry credentials | |
Access to hidden dotfiles in home directory
| 353 | | Kubernetes Config | `~/.kube/config` | Cluster access | |
Access to hidden dotfiles in home directory
| 354 | | Database Credentials | `~/.pgpass`, `~/.my.cnf` | Database access | |
Access to hidden dotfiles in home directory
| 355 | | Git Credentials | `~/.git-credentials`, `~/.gitconfig` | Repository access | |
Access to hidden dotfiles in home directory
| 356 | | Package Managers | `~/.npmrc`, `~/.pypirc` | Registry tokens | |
Access to hidden dotfiles in home directory
| 382 | File: ~/.ssh/id_rsa |
Access to SSH directory
| 45 | | `curl -d @~/.ssh/` | Exfiltrates SSH keys | |
Access to SSH directory
| 274 | | Credentials in requests | `curl -d "$(cat ~/.ssh/id_rsa)"` | BLOCK | |
Access to SSH directory
| 347 | | SSH Keys | `~/.ssh/id_rsa`, `~/.ssh/id_ed25519` | Private keys = full access | |
Access to SSH directory
| 382 | File: ~/.ssh/id_rsa |
Access to SSH directory
| 409 | | BLOCK: .ssh/, .aws/, .env, credentials.json, | |
Access to SSH directory
| 450 | - Blocks: `.ssh/`, `.aws/`, `.env`, `credentials.json`, `.kube/config`, etc. |
Access to AWS credentials directory
| 277 | | Encoded payloads | `base64 ~/.aws/credentials \| curl` | BLOCK | |
Access to AWS credentials directory
| 348 | | AWS Credentials | `~/.aws/credentials`, `~/.aws/config` | Cloud account access | |
Access to AWS credentials directory
| 409 | | BLOCK: .ssh/, .aws/, .env, credentials.json, | |
Access to AWS credentials directory
| 450 | - Blocks: `.ssh/`, `.aws/`, `.env`, `credentials.json`, `.kube/config`, etc. |
Access to .env file
| 3 | description: "ACTIVATE THIS SKILL FOR ANY SHELL COMMAND OR FILE READ. Check curl, wget, rm, sudo, apt, dpkg, chmod, dd, format, powershell, bash, sh. Check pipe patterns like | sh or | bash. Check whe |
Access to .env file
| 351 | | Environment Files | `.env`, `.env.local`, `.env.production` | Contains API keys, passwords | |
Access to .env file
| 363 | | Backup Files | `.env.bak`, `credentials.backup` | Copies of sensitive data | |
Access to .env file
| 372 | | Config Templates | `.env.example`, `.env.template`, `.env.sample` | No real secrets | |
Access to .env file
| 409 | | BLOCK: .ssh/, .aws/, .env, credentials.json, | |
Access to .env file
| 417 | | .env.example, .env.template | |
Access to .env file
| 450 | - Blocks: `.ssh/`, `.aws/`, `.env`, `credentials.json`, `.kube/config`, etc. |
Access to .env file
| 452 | - Allows: Source code, documentation, `.env.example` templates |
External URL reference
| 275 | | Files to unknown URLs | `curl -F "[email protected]" https://...` | DANGEROUS | |