setup-renovate-for-tuist
Audited by Socket on Mar 9, 2026
1 alert found:
Obfuscated FileThe skill's stated purpose—automating Renovate configuration for Tuist projects and optionally adding a GitHub Actions workflow—is coherent with its described steps (detection of integration style, package format, and generation of renovate.json). The workflow relies on standard, community-accepted tools (Renovate, npm, GitHub Apps/Actions). The main security considerations involve: (1) ensuring installs come from official registries (npm, Renovate) and not unverifiable binaries, (2) handling of credentials (the need for a PAT is legitimate but should be treated carefully and never exposed), and (3) ensuring that the generated automation does not perform actions without explicit user consent. Overall, the footprint is proportionate to the task, but there are indeterminacies around transitive installations and credential handling that merit caution. In absence of explicit unsafe patterns (unverifiable binaries, base64 payloads, or hidden exfiltration), this skill is rated as SUSPICIOUS-to-MINORLY-MINIMALLY-RISKY rather than benign due to the described potential for credential usage and automation flow. Final assessment leans toward SUSPICIOUS given the need to install and run external tooling in an automated fashion, but it remains plausible for its intended purpose if all sources are official and credentials are managed securely.