aws-ec2-setup
Warn
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyAnomalySKILL.md.original
LOWAnomalyLOW
SKILL.md.original
The deployment workflow is coherent for automated EC2 provisioning with monitoring and scaling, but it presents notable security and supply-chain risks due to unverified external code bootstrap, insecure SSH access placeholder, and sensitive key material handling in user-data. Immediate remediation should prioritize code verification (signing or hashing), removing or securely handling credentials, tightening network exposure, and ensuring secrets are not written to disk or logs. Overall risk: Significant; production use requires hardening and formal governance.
Confidence: 56%Severity: 68%
Audit Metadata