๐Ÿ›ก๏ธ SafeAgentSkills

Monkeytype Tracker and Advisor

View on ClawHub โ†— ยท v1.1.0

โฌ‡ 1,345 downloads

High Risk

Track and analyze Monkeytype typing statistics with improvement tips. Use when user mentions "monkeytype", "typing stats", "typing speed", "WPM", "typing practice", "typing progress", or wants to check their typing performance. Features on-demand stats, test history analysis, personal bests, progress comparison, leaderboard lookup, and optional automated reports. Requires user's Monkeytype ApeKey for API access.

H:4 D:4 A:1 C:1

โš ๏ธ Hazard Flags

FS_READ_WORKSPACE FS_WRITE_WORKSPACE FS_WRITE_USER NET_EGRESS_ANY CREDS_ENV PI_WEB PI_DOCUMENTS

๐Ÿ“‹ Capabilities

Execution

  • โŒ Shell execution
  • โŒ Code execution
  • โŒ Install dependencies
  • โŒ Persistence
  • Privilege: user

Filesystem

  • โœ… Read workspace
  • โœ… Write workspace
  • โŒ Read home
  • โœ… Write home
  • โŒ Read system
  • โŒ Delete

Network

  • Egress: any
  • โŒ Ingress

Credentials

  • โœ… Environment vars
  • โŒ Credential files
  • โŒ Browser data
  • โŒ Keychain

Actions

โŒ send messagesโŒ post publicโŒ purchaseโŒ transfer moneyโŒ deployโŒ delete external

๐Ÿ”’ Containment

Level: maximum

Recommended:
  • LOG_ACTIONS: Audit trail for all actions

โšก Risks

Prompt injection patterns detected in: SKILL.md high

Mitigation: Review SKILL.md for hidden instructions. Do not use with untrusted input.

Command injection risk: MCP_CMD_DANGEROUS_SYSTEM critical

Mitigation: Remove dangerous system commands.

Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION low

Mitigation: Provide clear, detailed description of skill functionality

Data exfiltration patterns: DATA_EXFIL_NETWORK_REQUESTS, DATA_EXFIL_ENV_VARS medium

Mitigation: Ensure network access is necessary and documented

Want a deeper analysis?

This report was generated by static analysis. Get an LLM-powered deep review with behavioral reasoning and attack surface mapping.

๐Ÿง  Deep Analysis โ€” $5.00

๐Ÿšจ Incident Response

Kill switch: Stop the agent process

Containment: Review logs for unexpected actions

Recovery: Depends on skill capabilities

๐Ÿ“„ Raw SSDS JSON click to expand
{
  "meta": {
    "document_id": "ssds:auto:monkeytype-tracker:1.1.0",
    "ssds_version": "0.2.0",
    "scanner_version": "0.4.0+fe6fd9123d50",
    "created_at": "2026-03-05T11:23:10.842Z",
    "created_by": {
      "agent": "safeagentskills-cli/generate-ssds"
    },
    "language": "en",
    "notes": "Auto-generated SSDS. Manual review recommended."
  },
  "skill": {
    "name": "Monkeytype Tracker and Advisor",
    "version": "1.1.0",
    "format": "agent_skill",
    "description": "Track and analyze Monkeytype typing statistics with improvement tips. Use when user mentions \"monkeytype\", \"typing stats\", \"typing speed\", \"WPM\", \"typing practice\", \"typing progress\", or wants to check their typing performance. Features on-demand stats, test history analysis, personal bests, progress comparison, leaderboard lookup, and optional automated reports. Requires user's Monkeytype ApeKey for API access.",
    "publisher": "ClawHub",
    "source": {
      "channel": "clawhub",
      "slug": "monkeytype-tracker",
      "owner": "Qrucio",
      "downloads": 1345,
      "stars": 0
    },
    "artifact": {
      "sha256": "2cc76c033c5e28902707b31f7098a3ab1fb96505699f40727e41dd104d7afcbe",
      "hash_method": "files_sorted"
    }
  },
  "capabilities": {
    "execution": {
      "can_exec_shell": false,
      "can_exec_code": false,
      "privilege_level": "user",
      "can_install_deps": false,
      "can_persist": false
    },
    "filesystem": {
      "reads_workspace": true,
      "reads_user_home": false,
      "reads_system": false,
      "writes_workspace": true,
      "writes_user_home": true,
      "writes_system": false,
      "can_delete": false
    },
    "network": {
      "egress": "any",
      "ingress": false
    },
    "credentials": {
      "reads_env_vars": true,
      "reads_credential_files": false,
      "reads_browser_data": false,
      "reads_keychain": false
    },
    "services": [],
    "actions": {
      "can_send_messages": false,
      "can_post_public": false,
      "can_purchase": false,
      "can_transfer_money": false,
      "can_deploy": false,
      "can_delete_external": false
    },
    "prompt_injection_surfaces": [
      "web",
      "documents"
    ],
    "content_types": [
      "general"
    ]
  },
  "hazards": {
    "hdac": {
      "H": 4,
      "D": 4,
      "A": 1,
      "C": 1
    },
    "flags": [
      "FS_READ_WORKSPACE",
      "FS_WRITE_WORKSPACE",
      "FS_WRITE_USER",
      "NET_EGRESS_ANY",
      "CREDS_ENV",
      "PI_WEB",
      "PI_DOCUMENTS"
    ],
    "custom_flags": [
      {
        "code": "PROMPT_INJECTION",
        "name": "Prompt Injection Risk",
        "description": "Contains prompt injection patterns in: SKILL.md"
      },
      {
        "code": "SOCIAL_ENGINEERING",
        "name": "Social Engineering Risk",
        "description": "SOCIAL_ENG_VAGUE_DESCRIPTION: Skill description is too vague or missing"
      },
      {
        "code": "COMMAND_INJECTION",
        "name": "Command Injection Risk",
        "description": "MCP_CMD_DANGEROUS_SYSTEM: Dangerous system commands or Windows exploitation"
      },
      {
        "code": "DATA_EXFILTRATION",
        "name": "Data Exfiltration Risk",
        "description": "DATA_EXFIL_NETWORK_REQUESTS, DATA_EXFIL_ENV_VARS: HTTP client library imports that enable external communication"
      }
    ],
    "confidence": {
      "level": "medium",
      "basis": [
        "static_analysis"
      ],
      "notes": "Detected 4 security patterns (4 vendored rule hits). Review recommended."
    },
    "rationale": {
      "H": "H4: Critical: Privilege escalation or malware detected",
      "D": "D4: Critical: Credential theft or data exfiltration",
      "A": "A1: Local side effects only",
      "C": "C1: General content"
    }
  },
  "containment": {
    "level": "maximum",
    "required": [],
    "recommended": [
      {
        "control": "LOG_ACTIONS",
        "reason": "Audit trail for all actions"
      }
    ],
    "uncontained_risk": "Risk level depends on manual review of actual capabilities."
  },
  "risks": {
    "risks": [
      {
        "risk": "Prompt injection patterns detected in: SKILL.md",
        "severity": "high",
        "mitigation": "Review SKILL.md for hidden instructions. Do not use with untrusted input."
      },
      {
        "risk": "Command injection risk: MCP_CMD_DANGEROUS_SYSTEM",
        "severity": "critical",
        "mitigation": "Remove dangerous system commands."
      },
      {
        "risk": "Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION",
        "severity": "low",
        "mitigation": "Provide clear, detailed description of skill functionality"
      },
      {
        "risk": "Data exfiltration patterns: DATA_EXFIL_NETWORK_REQUESTS, DATA_EXFIL_ENV_VARS",
        "severity": "medium",
        "mitigation": "Ensure network access is necessary and documented"
      }
    ],
    "limitations": [
      "Static analysis only - runtime behavior not verified"
    ]
  },
  "incident_response": {
    "kill_switch": [
      "Stop the agent process"
    ],
    "containment": [
      "Review logs for unexpected actions"
    ],
    "recovery": [
      "Depends on skill capabilities"
    ]
  },
  "evidence": [
    {
      "evidence_id": "EV:file-1",
      "type": "file_excerpt",
      "title": "_meta.json",
      "file_path": "_meta.json"
    },
    {
      "evidence_id": "EV:file-2",
      "type": "file_excerpt",
      "title": "SKILL.md",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:file-3",
      "type": "file_excerpt",
      "title": "scripts/monkeytype_stats.py",
      "file_path": "scripts/monkeytype_stats.py"
    },
    {
      "evidence_id": "EV:cisco-1",
      "type": "file_excerpt",
      "title": "SOCIAL_ENG_VAGUE_DESCRIPTION [LOW] SKILL.md:1: ---",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-2",
      "type": "file_excerpt",
      "title": "MCP_CMD_DANGEROUS_SYSTEM [CRITICAL] SKILL.md:54: - Windows (PowerShell): `$env:MONKEYTYPE_APE_KEY=\"YOUR_KEY_HERE\"`",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-3",
      "type": "file_excerpt",
      "title": "DATA_EXFIL_NETWORK_REQUESTS [MEDIUM] scripts/monkeytype_stats.py:18: import requests",
      "file_path": "scripts/monkeytype_stats.py"
    },
    {
      "evidence_id": "EV:cisco-4",
      "type": "file_excerpt",
      "title": "DATA_EXFIL_ENV_VARS [MEDIUM] scripts/monkeytype_stats.py:40: ape_key = os.getenv('MONKEYTYPE_APE_KEY')",
      "file_path": "scripts/monkeytype_stats.py"
    }
  ]
}