sast-scanning
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] This is documentation and sample configuration for static application security testing tools and CI integration. I found no malicious code, obfuscation, suspicious domains, or credential-exfiltration patterns in the supplied content. The primary issues are typical operational risks: example/placeholder credentials in docker-compose (do not use in production) and the normal need to protect CI secrets. The skill's capabilities, installs, and data flows are consistent with its stated purpose. LLM verification: The skill outline provides a coherent blueprint for SAST tooling integration but exhibits notable supply-chain risk signals due to unpinned dependencies and broad tooling adoption without provenance controls. To strengthen safety, enforce strict version pinning, source verification, and explicit data-flow/secrets handling policies before deployment.