What gets scanned
The page quickly explains the agent artifact classes users actually care about.
- Agent skills and instruction packs
- Hooks and helper scripts
- MCP configuration files
- Plugin manifests and repo instructions
Public repo scanning, safety-first MVP
Paste a public GitHub repository URL and run Agent Artifact Firewall in an isolated scan job. Review verdict, severity, artifact classes, and findings before you install a skill, plugin, hook, MCP config, or repo instruction pack.
Submit a public repository, queue a safe isolated scan, then review a clean report page with verdict, findings, and downloadable outputs.
What the experience should feel like
The visual pass is intentionally cleaner and lighter. The page should feel trustworthy, modern, and focused on one action, without reading like a prototype or a security dashboard dump.
The page quickly explains the agent artifact classes users actually care about.
The interaction stays understandable for non-technical users.
The product leads with trust and boundaries, not hype.
Why this exists
Agent Artifact Firewall helps teams inspect the files that shape agent behaviour before install, merge, or adoption. The public product should feel calm and credible, with enough polish to inspire trust while staying narrow and useful.
Users should understand the outcome quickly, not decode security tooling jargon.
Severity, artifact classes, and recommendations need to be readable on first scan.
JSON and Markdown reports should feel like part of a polished product, not an afterthought.