Free for the GitHub community

Scan agent-facing repositories before they reach your workflow.

Before your agents run it, scan it.

AAF Cloud Scan exists because malicious skills, hidden prompt instructions, unsafe hooks, poisoned MCP configs, and deceptive repo scaffolding can look harmless right up until they reach an agent workflow. It gives the GitHub community a fast way to inspect public repositories for agent-facing risk before install, merge, trust, or adoption.

Free public scanner Public GitHub repositories only Readable JSON and Markdown reports
AAF Cloud Scan security scanning hero illustration
Start a repository scan

Paste a public GitHub repository URL

Queue a scan, open a report, and review verdicts, findings, and downloadable outputs in one place.

Free right now: built for the GitHub community to review agent-facing repos before install, merge, or adoption.

Public GitHub repositories only. Private repositories are not supported.

Use it your way

Use the hosted scanner, review the GitHub repository, or run it from the command line.

If people prefer, they can use this hosted page, go straight to the GitHub repository, or use the action and command-line workflow directly in their own environment.

01

Hosted web scanner

Paste a public GitHub repository URL here and get a readable report without local setup.

02

GitHub repository

Prefer to inspect the project directly? Open the repository and review the action, code, and docs yourself.

View the GitHub repository

03

Command line / action flow

Teams that want CI or local workflows can use the GitHub action path or run the scanner from the command line in their own process.

What it checks

Repository trust review for agent-facing files.

Focused coverage for the files that shape agent behaviour, tool access, and workflow automation.

01

What gets scanned

Review the files most likely to change prompts, tools, hooks, and runtime behaviour.

  • Agent skills and instruction packs
  • Hooks and automation scripts
  • MCP configuration files
  • Plugin manifests and repo instructions
02

How it works

A fast path from repository URL to a report your team can review immediately.

  1. Validate the public GitHub repository URL
  2. Queue an isolated scan workflow
  3. Review verdict, findings, and exports
03

Built-in safeguards

Narrow scope, predictable controls, and a report-first workflow designed for trust.

  • Strict GitHub URL validation
  • Public repositories only
  • Rate limits and repository size checks
  • No target repo code execution

Why this exists

It was created because malicious agent-facing repo content is becoming a real attack surface.

Traditional code review often focuses on application logic, but modern agent workflows can be compromised by files that sit around the code: SKILL.md instructions, AGENTS.md guidance, hook definitions, MCP configs, plugin manifests, bootstrap scripts, and other repo-level artifacts that shape what an agent sees, trusts, and executes.

AAF Cloud Scan was created to catch that class of risk earlier. It helps reviewers spot malicious skills, hidden prompt injection, approval-bypass language, secret access attempts, unsafe automation hooks, and other agent-targeted traps before those files are allowed into a workflow.

Clear verdicts

Understand the overall outcome quickly, with severity and supporting context at a glance.

Readable findings

Review structured findings without digging through raw logs or piecing together workflow output.

Downloadable reports

Export JSON and Markdown for security review, internal sharing, or audit records.

Free access

Made to help the GitHub community catch risky agent artifacts earlier.

This scanner is currently free for public GitHub repositories so maintainers, security reviewers, and curious builders can check agent-facing files without friction.

Free public scans

No paywall for baseline repo checks while the product matures.

Focused on agent-era risk

Skills, hooks, scripts, MCP configs, and instruction files get first-class attention.