Local Model Prompt Injection Scanner for AI Skills Security

Security Vulnerability in AI Skills
A discussion on X highlighted a serious security flaw in third-party AI skills. Claude Code supports the ! operator to execute bash commands directly within skills, but these operators can be hidden in HTML tags, leading to bash executions that the LLM might not be aware of.
Local Scanner Implementation
A proof-of-concept tool has been built to scan skills for potential malware injection at installation time. The scanner uses a non-tool-calling model running locally, specifically mistral-small:latest on Ollama. The creator reports it "worked like a charm" during testing.
The approach functions similarly to a virus scanner and could be integrated into a future "skill installer" product. Protection against prompt injection is identified as a promising application for local models.
Technical Details
The vulnerability involves the ! operator in Claude Code that allows direct bash command execution. Attackers can hide these operators within HTML tags, potentially executing malicious commands without the LLM's knowledge. The scanner addresses this by analyzing skills before installation to detect such hidden injections.
📖 Read the full source: r/LocalLLaMA
👀 See Also

Malicious Google Ad Targets Claude Code Installation
A malicious Google ad appears as the top result for 'install claude code' searches, attempting to trick users into running suspicious terminal commands. The ad was still active as of March 15, 2026, and the author narrowly avoided executing the code.

Critical OpenClaw Security Vulnerabilities Patched in 2026.3.28
OpenClaw version 2026.3.28 patches 8 critical security vulnerabilities found by Ant AI Security Lab, including sandbox bypass, privilege escalation, and SSRF risks. Users on versions ≤2026.3.24 should update immediately.

OpenClaw Skill Safety Scanner: 7.6% of 31,371 Skills Flagged as Dangerous
A developer built a tool that scanned the entire ClawHub registry and found 2,371 out of 31,371 skills contain dangerous patterns like wallet drainers, credential theft, and prompt injection. The tool provides API access and badges for checking skills before installation.

Critical RCE vulnerability in protobuf.js library
A critical remote code execution vulnerability in protobuf.js versions 8.0.0/7.5.4 and lower allows JavaScript code execution through malicious schemas. Patches are available in versions 8.0.1 and 7.5.5.