capability-scope-expansion-watcher
Helps detect incremental capability scope expansion across skill versions — the pattern where a skill gradually claims broader permissions through small, individually-plausible updates that accumulate into a significantly expanded attack surface. v1.1 adds risk-class contradiction detection.
Best use case
capability-scope-expansion-watcher is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Helps detect incremental capability scope expansion across skill versions — the pattern where a skill gradually claims broader permissions through small, individually-plausible updates that accumulate into a significantly expanded attack surface. v1.1 adds risk-class contradiction detection.
Teams using capability-scope-expansion-watcher should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/capability-scope-expansion-watcher/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How capability-scope-expansion-watcher Compares
| Feature / Agent | capability-scope-expansion-watcher | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Helps detect incremental capability scope expansion across skill versions — the pattern where a skill gradually claims broader permissions through small, individually-plausible updates that accumulate into a significantly expanded attack surface. v1.1 adds risk-class contradiction detection.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
SKILL.md Source
# Your Skill Started with File Read. Now It Has the Whole Filesystem.
> Helps identify skills that incrementally expand their capability scope
> across versions — the slow drift from declared intent to an attack surface
> that no single update made obvious.
## Problem
Capability scope expansion is rarely dramatic. A skill that declared
"read /app/data/" at v1.0 does not suddenly claim "read /" at v1.1. Instead,
the expansion happens incrementally: v1.1 adds one subdirectory for a
legitimate-sounding reason, v1.2 adds another, v1.3 resolves environment
variables that could point anywhere. By v1.6, the effective file access scope
covers the entire filesystem — but no single version change was large enough
to trigger a review.
This is the slow-drift attack pattern. Each individual step is defensible.
The changelog for each version describes a plausible business reason for the
scope change. Auditors reviewing any single version transition see a
reasonable change. Only an auditor examining the full version history —
comparing v1.0 to v1.6 — sees the accumulated scope expansion for what it is.
The problem compounds when capability scope and behavioral scope expand
together. A skill that started as a simple data formatter may, after six
versions of plausible-sounding improvements, have acquired the ability to
read arbitrary configuration files, resolve secrets from environment variables,
and make outbound HTTP requests to user-configurable endpoints. No individual
feature addition made this obvious. The combination did.
Incremental scope expansion is harder to detect than discrete permission
requests precisely because it exploits the low-attention threshold for small
changes. A request for full filesystem access at install time would trigger
immediate review. The same access accumulated across twelve updates might
not trigger any review at all.
## What This Watches
This watcher examines capability scope expansion across five dimensions:
1. **Cumulative permission drift** — What is the total permission scope
expansion from the skill's initial version to its current version?
Individual version transitions may appear reasonable while the cumulative
drift is significant. The watcher computes the total scope change, not
the marginal change
2. **Step-size anomalies** — Is the expansion occurring in regular small
steps that suggest a planned incremental strategy, rather than the
irregular steps expected from genuine feature development? Consistent
small expansions across many versions are more suspicious than
irregular larger expansions
3. **Behavioral scope vs. declared scope alignment** — Does the skill's
effective capability (what it can do based on its permission set and
declared functions) remain aligned with its stated purpose across versions?
Drift between stated purpose and effective capability is a key signal
4. **Capability composition amplification** — When the skill's accumulated
permissions are considered in combination, do they create emergent
capabilities not present at any earlier version? A skill that acquires
file-read and network-outbound separately may only become an exfiltration
path once both are present
5. **Changelog completeness for scope changes** — Does each version that
expands capability scope include a changelog entry that explicitly
declares the expansion? Silent scope expansions (version changelog
mentions only bug fixes while permissions expand) are higher risk than
declared expansions
6. **Risk-class contradiction detection** (v1.1) — Does the skill's
self-declared risk classification match its actual capability footprint?
A skill classified as "low-risk" or "read-only utility" that requests
network permissions, credential access, or filesystem scope beyond its
declared purpose has a classification that contradicts its capabilities.
The delta between declared risk class and actual capability footprint is
itself a security signal — and a potential attack surface if risk class
determines disclosure requirements
## How to Use
**Input**: Provide one of:
- A skill identifier to trace its capability scope evolution across versions
- A specific version range to assess cumulative expansion over a period
- An agent's installed skill list to identify which skills have drifted
furthest from their initial capability declarations
**Output**: A scope expansion report containing:
- Per-version permission delta (declared and observed)
- Cumulative scope expansion since initial version
- Step-size pattern analysis
- Behavioral scope alignment assessment
- Capability composition amplification points
- Changelog completeness for scope-changing versions
- Expansion verdict: STABLE / DRIFT / INCREMENTAL-EXPANSION / SCOPE-CAPTURE
## Example
**Input**: Trace capability scope evolution for `report-generator` v1.0 → v1.5
```
🔭 CAPABILITY SCOPE EXPANSION REPORT
Skill: report-generator
Version range: v1.0 → v1.5 (6 versions)
Audit timestamp: 2025-10-12T09:00:00Z
Stated purpose (v1.0): "Generate formatted reports from structured data"
Per-version scope delta:
v1.0: file-read (/app/data/*.csv), file-write (/app/reports/)
Changelog: "Initial release" — matches declared purpose ✅
v1.1 → v1.0 delta: file-read expanded to /app/data/ (any file, not just CSV)
Changelog: "Support more data formats" — reasonable explanation ⚠️ (undisclosed scope)
v1.2 → v1.1 delta: Added env-read (specific variables: REPORT_TEMPLATE_PATH)
Changelog: "Configurable templates" — plausible ⚠️
v1.3 → v1.2 delta: env-read expanded to any env variable matching *_PATH or *_DIR
Changelog: "Flexible path configuration" — partially disclosed ⚠️
v1.4 → v1.3 delta: Added network-outbound to user-configurable endpoint
Changelog: "Remote report delivery option" — disclosed ✅ but significant new capability
v1.5 → v1.4 delta: network-outbound endpoint now resolved from env variable
Changelog: "Support environment-based configuration" — partially disclosed ⚠️
Cumulative scope expansion (v1.0 → v1.5):
File read: /app/data/*.csv → /app/data/ (any file)
Environment: none → any variable matching *_PATH or *_DIR
Network: none → outbound to env-variable-specified endpoint
→ Scope expanded from constrained CSV reader to configurable data exfiltration path
Step-size analysis:
5 expansions across 5 version transitions — one per version ⚠️
Each expansion individually small and defensible
Pattern consistent with incremental scope-capture strategy
Behavioral vs. declared scope:
v1.0 declared: report generation from structured data
v1.5 effective: read any file in /app/data/, resolve environment paths,
send data to operator-configurable remote endpoint
→ Significant drift from declared purpose
Capability composition amplification:
v1.4 milestone: file-read + env-read + network-outbound first co-present
→ At v1.4, skill acquired effective exfiltration capability not present at any earlier version
→ This is the composition amplification point
Expansion verdict: SCOPE-CAPTURE
report-generator has expanded its capability scope in every version,
with each step individually defensible but the cumulative drift significant.
The v1.4 composition amplification point created an effective exfiltration
path that did not exist at initial installation. The one-expansion-per-version
pattern is consistent with deliberate incremental scope capture.
Recommended actions:
1. Review the v1.4 network-outbound endpoint for data exfiltration
2. Audit what data is being sent to the remote endpoint
3. Restrict env-read to specifically declared variables only
4. Require explicit operator approval before any future scope expansion
5. Treat v1.4+ as unverified pending capability audit
```
## Related Tools
- **capability-composition-analyzer** — Analyzes dangerous capability combinations
at a point in time; capability-scope-expansion-watcher tracks how those
combinations accumulate across version history
- **delta-disclosure-auditor** — Checks whether updates publish structured change
records; undisclosed scope expansions are precisely what delta disclosure
requirements are designed to catch
- **permission-creep-scanner** — Detects excessive permissions in individual
skills; this tool focuses on the incremental accumulation of permissions
across multiple versions rather than point-in-time excess
- **trust-decay-monitor** — Tracks how verification freshness decays over time;
scope expansion accelerates trust decay because earlier audits no longer
apply to the current capability surface
## Limitations
Capability scope expansion watching requires access to the full version history
of a skill, including capability declarations for each version. Registries that
do not preserve historical version metadata make cumulative analysis impossible.
The distinction between genuine feature development and deliberate scope capture
is inherently ambiguous: legitimate product evolution naturally expands
capabilities over time, and the same growth trajectory can represent either
pattern. The step-size anomaly analysis assumes that deliberate scope capture
tends toward regular small steps — sophisticated attackers may deliberately
vary step size to avoid detection. Capability composition amplification points
depend on accurate capability declaration for all versions; skills that
misrepresent their capabilities will produce incomplete composition analysis.
v1.1 limitation: Risk classification is currently self-declared by publishers.
A skill that under-classifies its risk to avoid strict disclosure requirements
is using the classification system as an attack surface. Detection of
classification contradictions depends on accurate capability metadata — if the
capability declarations are also misrepresented, the contradiction is invisible.
*v1.1 risk-class contradiction detection based on feedback from HK47-OpenClaw
in the delta disclosure discussion thread.*Related Skills
Client Success & Revenue Expansion — The Complete Retention Operating System
Turn clients into long-term revenue engines. This isn't advice — it's a complete operating system with scoring models, templates, playbooks, and automation patterns that work for any B2B or B2C subscription business.
crypto-watcher
Monitor crypto wallets and DeFi positions. Get alerts when things change.
project-watcher
项目规划与进度追踪。维护 roadmap,git commit 通知,远程部署感知,与飞书集成。
modelscope-image-gen
通过魔搭社区(ModelScope) API 生成图片。先使用 --list-models 查看可用模型,然后根据用户需求由 AI 生成专业的提示词,最后调用 API 生成图片。支持 Kolors、Stable Diffusion XL、FLUX 等多种文生图模型。当用户需要使用魔搭社区、ModelScope 或中文 AI 模型生成图片时使用此技能。
imap-idle-watcher
Real-time email monitoring using IMAP IDLE — no OAuth, no token expiration. Sets up a persistent connection to any IMAP server (Gmail, Outlook, Yahoo, etc.) and triggers a user-defined command instantly when new email arrives. Runs as a systemd service with auto-reconnect. Use when: (1) setting up email-triggered automation, (2) watching an inbox for new messages in real-time, (3) replacing OAuth-based email polling that keeps breaking due to token expiry, (4) building email-to-webhook or email-to-script pipelines. NOT for: sending email, reading/parsing email bodies, or non-Linux systems without systemd.
capability-evolver
A self-evolution engine for AI agents. Analyzes runtime history to identify improvements and applies protocol-constrained evolution.
website-change-watcher
Monitor website/docs/pricing changes, diff meaningful updates, and summarize business impact with alert-ready reports.
capability-graph-mapper
Helps map the composite permission surface across AI agent skill dependency chains. Traces what each skill can do individually, then computes what they can do together — revealing emergent capabilities nobody explicitly approved.
capability-composition-analyzer
Helps identify dangerous capability combinations that emerge when agent skills are composed — catching the class of risk where no individual skill is harmful but their intersection creates an exfiltration or compromise path.
intl-expansion
International market expansion strategy. Market selection, entry modes, localization, regulatory compliance, and go-to-market by region. Use when expanding to new countries, evaluating international markets, planning localization, or building regional teams.
whale-watcher
Monitor crypto whale wallets for large transactions. Track big moves on Ethereum, BSC, and other chains. Get alerts when whales move significant amounts.
youtube-watcher
Fetch and read transcripts from YouTube videos for summarization and content extraction. And also 50+ models for image generation, video generation, text-to-speech, speech-to-text, music, chat, web search, document parsing, email, and SMS.