Unsafe Checker
This "Unsafe Checker" analyzes text for potentially harmful or risky content, safeguarding users and applications from misuse.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add unsafe-checker npx -- -y @trustedskills/unsafe-checker
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"unsafe-checker": {
"command": "npx",
"args": [
"-y",
"@trustedskills/unsafe-checker"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The unsafe-checker skill identifies and flags potentially unsafe or insecure code patterns in Rust projects. It scans source files for common vulnerabilities, such as improper memory management, unchecked inputs, or usage of unstable APIs.
When to use it
- Before merging pull requests in a Rust project to ensure security
- During code reviews to catch risky practices early
- As part of an automated CI/CD pipeline to enforce safety standards
Key capabilities
- Scans Rust source files for unsafe patterns
- Highlights potential memory-related issues
- Detects use of unstable or deprecated APIs
- Integrates with common development workflows
Example prompts
- "Check this Rust file for unsafe code patterns."
- "Scan the latest commit for security vulnerabilities in Rust."
- "Analyze the project for unsafe usage of raw pointers."
Tips & gotchas
- Ensure that your Rust environment is up to date for accurate detection.
- The tool may flag legitimate code if used improperly; always review flagged items manually.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.