Discover
Find `SKILL.md`, agent instruction files, prompt packs, MCP manifests, scripts, manifests, lockfiles, and Docker artifacts.
skill-veil
Scan skills, prompt packs, instruction files, MCP manifests, scripts, and runtime artifacts before they become trusted agent behavior.
Agent extensions are often markdown, manifests, and natural-language instructions. skill-veil gives reviewers and CI pipelines a focused answer: should this artifact be allowed, reviewed, or blocked?
Execution model
Find `SKILL.md`, agent instruction files, prompt packs, MCP manifests, scripts, manifests, lockfiles, and Docker artifacts.
Apply rule packs, taint checks, semantic patterns, artifact parsing, and optional external enrichment.
Map findings to `log`, `require_approval`, or `block` with policy profiles, waivers, baselines, and overrides.
Emit JSON, SARIF, SHIELD, compact summaries, and diff decisions that CI can enforce without noisy logs.
What it catches
Generic malware engines are strongest on executable reputation and binary indicators. skill-veil targets the layer where an agent extension can hide intent: instructions, helper scripts, autonomy patterns, and access to secrets or network sinks.
Open the threat modelReview artifact
Keep JSON for diffing and baselines, upload SARIF to code scanning, and use compact summaries when the build log should show only what changed.
skill-veil scan-package . --format json --output current.json
skill-veil diff previous.json current.json \
--baseline .skill-veil/baseline.json \
--waivers .skill-veil/waivers.yaml \
--ci-summary --fail-on new-active
DIFF new_active=0 resolved=2 waived=1 baselined=3 unchanged=5
Operational fit
git clone https://github.com/seifreed/skill-veil.git
cd skill-veil
cargo install --path crates/skill-veil-cli
skill-veil init
skill-veil scan-file examples/malicious-skill/SKILL.md
skill-veil scan-package . --preset ci
skill-veil scan-package . \
--format sarif \
--output artifacts/current.sarif