tool-creator

Warn

Audited by Socket on Mar 26, 2026

1 alert found:

Security
SecurityMEDIUM
references/tool-examples.md

This code intentionally enables execution of arbitrary shell commands and arbitrary Python code and wires those capabilities into agent components that send prompts and state to external LLM services. There is no input sanitization, no sandboxing, and logging may leak secrets. I find no evidence of obfuscation or explicit malicious payloads (e.g., reverse shell or hardcoded credentials), but the design is high-risk: if these tools are exposed to untrusted inputs or automated agents, they provide straightforward vectors for command execution, data exfiltration, and privilege abuse. Treat inclusion of these modules in production without strong containment and policy controls as a significant security hazard.

Confidence: 90%Severity: 80%
Audit Metadata
Analyzed At
Mar 26, 2026, 04:54 PM
Package URL
pkg:socket/skills-sh/aws-samples%2Fsample-deep-insight%2Ftool-creator%2F@0ea7beebea228d9446423da40ccc95360881a72c