Claude-skill-registry special-chars-skill
A skill for testing special characters and injection patterns
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/edge-special-chars" ~/.claude/skills/majiayu000-claude-skill-registry-special-chars-skill && rm -rf "$T"
manifest:
skills/data/edge-special-chars/SKILL.mdsource content
Special Characters Skill
This skill tests handling of special characters in $ARGUMENTS placeholder.
Test cases covered:
- HTML/XML special chars: < > & " '
- Shell metacharacters: $ ` ; | & ( ) [ ] { }
- Path traversal attempts: ../ ../../etc/passwd
- SQL injection patterns: ' OR '1'='1
- Command injection: ; rm -rf / ; $(whoami)
- Unicode and emoji: 你好 🎉 émoji
Usage: $ARGUMENTS
Expected Behavior
The ContentProcessor should safely substitute arguments without:
- Executing shell commands
- Interpreting special characters
- Allowing path traversal
- Enabling injection attacks
All input should be treated as literal text.