home / skills / jeremylongshore / claude-code-plugins-plus-skills / plugin-auditor
This skill audits AI assistant code plugins for security, best practices, and quality, applying automated reviews and compliance checks.
npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill plugin-auditorReview the files below or copy the command above to add this skill to your agents.
---
name: plugin-auditor
description: |
Audit automatically audits AI assistant code plugins for security vulnerabilities, best practices, AI assistant.md compliance, and quality standards when user mentions audit plugin, security review, or best practices check. specific to AI assistant-code-plugins repositor... Use when assessing security or running audits. Trigger with phrases like 'security scan', 'audit', or 'vulnerability'.
allowed-tools: Read, Grep, Bash(cmd:*)
version: 1.0.0
author: Jeremy Longshore <[email protected]>
license: MIT
---
# Plugin Auditor
## Overview
This skill provides automated assistance for the described functionality.
## Prerequisites
- Appropriate file access permissions
- Required dependencies installed
## Instructions
1. Invoke this skill when the trigger conditions are met
2. Provide necessary context and parameters
3. Review the generated output
4. Apply modifications as needed
## Output
The skill produces structured output relevant to the task.
## Error Handling
See `{baseDir}/references/errors.md` for comprehensive error handling.
## Examples
See `{baseDir}/references/examples.md` for detailed examples.
## Resources
- Project documentation
- Related skills and commands
This skill automates security and quality audits for AI assistant code plugins, focusing on vulnerabilities, best practices, and compliance with assistant guidelines. It analyzes plugin code, configuration, and metadata to produce prioritized findings and remediation steps. Use it to get fast, repeatable assessments before release or marketplace submission.
The auditor scans repository files, dependency manifests, and plugin manifests to detect insecure patterns, outdated libraries, and misconfigurations. It applies rule sets for security, code quality, and assistant-specific compliance, then ranks issues by severity and confidence. The output includes a structured report with reproduce steps, suggested fixes, and links to reference guidance.
What inputs does the auditor need?
Point it at the plugin repository or provide the file set, including dependency manifests, plugin manifest, and configuration files. Access to lockfiles yields more accurate dependency checks.
Can it auto-fix issues?
The auditor generates actionable remediation steps and minimal code or config suggestions for common issues, but it does not apply fixes automatically; manual review is recommended.