case-study-writing
Audited by Socket on Mar 8, 2026
1 alert found:
MalwareThe skill’s stated purpose (case study writing with STAR framework, metrics, and visuals) is partially coherent with its capabilities. However, the installation method (curl | sh from an external domain with checksum verification) introduces a significant supply-chain and execution-trust risk. Data flows involve external CLI invocations and third-party research endpoints, which is expected for research-driven content but requires explicit user consent and data handling safeguards. Given the unverifiable binary download path and potential data exposure through external services, the overall assessment leans toward SUSPICIOUS with notable security considerations; it should not be deemed completely benign without replacing the install flow with a verifiable registry-backed approach and explicit data-flow disclosures.