Let your team vibe code - without giving away the keys
AI coding agents like Cursor, Claude Code, and Copilot are powerful - but they execute Skills, invoke tools, and access credentials with zero security review. Enkrypt AI gives you the scan-and-govern layer that's missing.

Skills are executable plugins - not documentation
When a developer clones a repo with a .cursor/skills/ or .claude/skills/ directory, they're installing behavior that controls what their AI agent does. A Skill can tell the agent which commands to run, what files to access, and how to handle sensitive data.
No installation dialog, no security warning, no permission prompt
Malicious instructions can be hidden deep in markdown files - past where scanners stop reading
Auto-activation means a routine request like "clean up this code" can trigger credential theft
Current security scanners truncate files and miss attacks beyond the first ~3,000 characters
Real attack - demonstrated by Enkrypt AI
Developer clones a repo containing a "code-cleanup" Skill
Opens it in Cursor and asks to "clean up this code"
Agent matches the request to the Skill and auto-activates it
Hidden instructions deep in SKILL.md tell the agent to run a script
The script reads ~/.ssh/id_rsa and exfiltrates it to an attacker endpoint
Scan the supply chain. Govern the runtime.
Scanning catches threats before they execute. Guardrails enforce policy while agents are running. You need both.
What Skill Sentinel and Guardrails catch
Mapped to OWASP Top 10 for LLM Applications and OWASP Top 10 for Agentic Applications.
From clone to governed in four steps
Skill Sentinel scans before execution. Guardrails enforce during execution. Both produce evidence.
Run Skill Sentinel on .cursor/skills/ and .claude/skills/ — in CI or locally

Triage findings, block malicious Skills, approve safe ones into your allowlist

Integrate runtime enforcement — command allowlists, data policies, approval gates

Every enforcement decision logged with policy_id — export to SIEM or audit packet

Running in minutes, not sprints
Skill Sentinel is open source and installs with pip. Guardrails integrate via hooks or proxy.
Skill Sentinel — scan your Skills
# Install
pip install skill-sentinel
# Scan a single Skill
skill-sentinel scan --skill ./my-skill
# Scan all Cursor skills in parallel
skill-sentinel scan cursor --parallel
# Auto-discover and scan everything
skill-sentinel scan
# CI/CD integration
skill-sentinel scan --dir .cursor/skills/
skill-sentinel scan --dir .claude/skills/Guardrails — enforce at runtime
# Hook into your coding agent
# via API wrapper, proxy, or SDK
# Define a policy pack
policy:
block_commands:
- curl, wget, nc, ssh
- pip install, npm install
block_file_access:
- ~/.ssh/*, ~/.aws/*
- .env, *.pem, *.key
require_approval:
- deploy, publish, push
- rm -rf, chmod, chown
# Every decision → policy_id + traceWorks with the coding agents your team already uses
Skill Sentinel scans Skills from any provider. Guardrails hook into any agent's execution path.




Frequently Asked Questions
skill-sentinel scan --dir .cursor/skills/ as a CI step. It produces JSON reports with severity levels, evidence, and remediation recommendations. Gate your pipeline on the results — block merges that introduce malicious or suspicious Skills.- (1) Install Skill Sentinel and scan all Skills in your repos today — it takes five minutes.
- (2) Disable auto-execution in your coding agents and require explicit approval for commands.
- (3) Add CODEOWNERS rules to require security review for changes to .cursor/ and .claude/ directories. These three steps cover the most critical gaps while you evaluate the full Guardrails integration.
