agent
Audited by Socket on Mar 9, 2026
2 alerts found:
Obfuscated Filex2This file appears to be a benign utility, but it contains a high-risk pattern: constructing and executing a shell command from untrusted command-line input using execSync with shell: true. This creates an easy shell-injection vector allowing arbitrary command execution with the script's privileges. Secondary risk: the script persists whatever the external tool outputs into local logs without redaction, which can leak secrets. No evidence exists in this code fragment of intentional malware, obfuscation, or hard-coded backdoors, but the injection pattern makes the module dangerous if exposed to untrusted input. Recommendations: do not interpolate untrusted input directly into a shell command; instead use execFile/child_process.spawn with argument arrays or properly escape/quote the input. Validate or restrict prompts, avoid synchronous execSync where possible, and redact or gate logging of potentially sensitive output.
The skill concept is coherent with its stated goal of dispatching tasks to an agent and logging processing traces per task. However, there are notable security concerns: potential command-injection from unvalidated CLI input, possible sensitive data exposure via logs, and reliance on an external opencode CLI whose provenance is unclear. The design is moderately risky and warrants tightening input validation, restricting log content, and ensuring provenance and integrity of the opencode CLI. Parallel logging is sensible but requires proper synchronization to avoid race conditions and unintended data leakage.