Comparison
Praxl vs skillshare
Deep content scanning. Shallow structural safety.
skillshare is the strongest open-source security story in this category. Its built-in audit engine ships with roughly 500 deterministic rules covering prompt injection, invisible Unicode payloads (the Pillar Security "Rules File Backdoor" attack), credential access patterns, exfiltration via curl/wget, RCE one-liners, and more — and it actively blocks installation when CRITICAL findings appear. Praxl approaches the same problem from the opposite direction: structural defense (sandbox, allowlists, opt-in trust paths, dual validation) rather than content inspection.
skillshare is a Go CLI by runkids — single static binary, no Node runtime — with a TUI built on Charmbracelet's Bubbletea and an embedded local web dashboard. It manages a central skill store (~/.config/skillshare/) and uses POSIX symlinks (or NTFS junctions on Windows) to deploy skills into 57 declared tool directories.
Feature comparison
| Feature | Praxl | skillshare |
|---|---|---|
| AI tools supported | –9 (Claude Code, Cursor, Codex, Copilot, Windsurf, Gemini, OpenCode, OpenClaw, Claude.ai) | ✓57 via declarative YAML (incl. Antigravity, Augment, Bob, Cline, Codex, Cortex, Crush, Goose, Hermes, Kilo, Kimi, Kiro, Letta, Trae, Witsy) |
| Security audit engine | –Structural defense + 5-dim AI quality review (not security-focused) | ✓~500 deterministic rules: prompt injection, Unicode tag chars, credential access, RCE, exfiltration, obfuscation |
| Blocks malicious skills | =Defense-in-depth (sandbox + allowlist) prevents many attack vectors structurally | =ErrBlocked sentinel — install/sync fails on CRITICAL findings |
| Visual web editor | ✓Monaco editor accessible from any device | –Embedded local web dashboard (single-machine only) |
| Team workspaces | ✓Organizations with roles + bidirectional cloud sync | –None — single-user, Git-shared |
| Sync mechanism | ✓Bidirectional cloud ↔ local with extension allowlist | –Symlinks (POSIX) or junctions (Windows) — no extension filter at write |
| basePath sandbox | ✓Default dot-folders only + opt-in trust-path | –None — symlinks accept arbitrary targets |
| Marketplace | ✓ClawHub integration (13,700+ skills) | –None built-in (community sharing via Git) |
| AI quality review | ✓5-dimension scoring + suggestions | –None (security audit only) |
| Distribution | –npm install -g praxl-app | ✓Single static Go binary (no Node runtime) |
| Test coverage | –Growing — security-critical paths covered | ✓Near-total in audit module (~100 test files) |
| Web search audit features | –Quality scoring on clarity, specificity, structure, completeness, actionability | ✓Unicode tag char detection, dataflow analysis, credential exfiltration patterns, SARIF output |
| Server command channel | =Whitelist {sync, disconnect, import} + 10-min import rate limit | =N/A — no server/client split |
| Audit log for security events | ✓~/.praxl/audit.log dedicated security trail | –Operational oplog only |
Why choose Praxl
- ✓Bidirectional cloud sync — edit in browser or locally, syncs across machines
- ✓Team workspaces with role-based access (skillshare is single-user)
- ✓Structural defense in depth: extension allowlist + basePath sandbox + opt-in trust-path closes attack vectors that content scanning alone can miss
- ✓AI quality review for skill clarity and structure (skillshare audits security, not quality)
- ✓Built-in marketplace with 13,700+ skills
- ✓Visual web editor accessible from any device, not just the local machine
Why choose skillshare
- •Roughly 500 deterministic security rules — the deepest content scanner in the open-source skill space
- •Detects invisible Unicode tag chars (Rules File Backdoor / CVE-2021-42574 class) that most tools miss entirely
- •57 supported AI tools via declarative YAML — adding a new tool is one config block, no code
- •Single static Go binary — no Node runtime, no Docker, no server even for self-managed use
- •Near-total test coverage in the audit module
- •MIT licensed — more permissive than Praxl's AGPL-3.0 server license, easier to embed inside a proprietary internal tool
The verdict
skillshare and Praxl genuinely solve the same problem from opposite ends. skillshare scans content with ~500 deterministic rules and blocks installs that trip them — that's deeper security inspection than Praxl currently has, and we recommend it without reservation if your threat model is "a teammate installs a malicious skill from the internet." Praxl's bet is the other half of the problem: a structural sandbox (extension allowlist, basePath restriction, opt-in trust paths) catches classes of attack that don't show up in content patterns, plus the platform layer skillshare doesn't aim for — bidirectional cloud sync, team workspaces, AI quality review, and a hosted web editor. The most defensible setup is to run both: skillshare auditing skill content before it reaches your tools, Praxl managing the lifecycle, sync, and team collaboration around them.
See pricing →
Free, $5/mo Pro, or self-host free
Security model →
Defense-in-depth, audit log
Open source →
AGPL-3.0, audit the code

Praxl