jeo
Audited by Socket on Mar 11, 2026
1 alert found:
SecurityThe JEO skill presents a coherent, ambitious orchestration workflow that could be valuable for multi-agent automation across Claude Codex Gemini OpenCode ecosystems. However, its footprint includes substantial reliance on unverifiable binaries and transitive installations from multiple external sources, creating a multi-layered supply-chain and credential-surface risk. The architecture also broadens the trust boundary by configuring and interacting with several local and remote UI/hook endpoints. Given the combination of complex data flows, potential credential pathways, and multiple third-party binaries, the footprint is more than benign and warrants Suspicious to High risk assessment. The most defensible stance is SUSPICIOUS (leaning toward HIGH risk) until sources are pinned, binaries reproducibly verifiable (with checksums/signatures), and stray data flows minimized or clearly scoped to the stated orchestration goals.