skills
Audited by Socket on Feb 28, 2026
1 alert found:
Obfuscated FileThe code fragment itself contains no explicit malware or obfuscated payloads, but its operational model poses a meaningful supply-chain risk. Allowing unpinned, unaudited npx-based installs (Bash(npx:*)) and coordinating transitive installs that run with agent privileges can enable remote code execution, credential access, repository modification, and broader compromise through transitive dependencies. Recommended mitigations: restrict and whitelist install sources, pin package versions and verify checksums/signatures, require explicit human approval for installs (especially in CI/automated contexts), sandbox or run installers with reduced privileges, and log/monitor install actions. Treat this package as a supply-chain risk until integrity and least-privilege controls are enforced.