sast-scanning

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] This is documentation and sample configuration for static application security testing tools and CI integration. I found no malicious code, obfuscation, suspicious domains, or credential-exfiltration patterns in the supplied content. The primary issues are typical operational risks: example/placeholder credentials in docker-compose (do not use in production) and the normal need to protect CI secrets. The skill's capabilities, installs, and data flows are consistent with its stated purpose. LLM verification: The skill outline provides a coherent blueprint for SAST tooling integration but exhibits notable supply-chain risk signals due to unpinned dependencies and broad tooling adoption without provenance controls. To strengthen safety, enforce strict version pinning, source verification, and explicit data-flow/secrets handling policies before deployment.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 03:42 AM
Package URL
pkg:socket/skills-sh/bagelhole%2Fdevops-security-agent-skills%2Fsast-scanning%2F@e4df1c9b7b30933f7d4c5fb51593ac908b987122