todo
Audited by Socket on Feb 20, 2026
1 alert found:
Malware[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill appears functionally coherent and aligned with its stated purpose (task pickup, gather context, mark in-progress, brief). It legitimately reads a local task file and contacts official provider endpoints (Atlassian, GitHub, Slack via MCP) to gather context. Primary risks are operational: (1) required Jira credentials are used in curl basic-auth to download attachments — ensure credentials are provided securely and not logged; (2) MCP connectors will route data through their configured infrastructure and should be trusted/audited; (3) the skill reads and writes local files in ~/.claude which should be protected by filesystem permissions. No clear malicious code or obfuscation is present in the provided document. Recommend review/audit of MCP endpoints and safeguarding of env vars before use. LLM verification: The skill’s described capabilities are broadly coherent with its stated purpose of selecting and briefing on today’s tasks and gathering Jira/Confluence/Slack/PR context. Data flows and sinks are consistent with a legitimate task-management integration. The main concerns are security-conscious handling of credentials, ensuring only authorized systems access data, and avoiding execution or exposure of sensitive commands in user-facing documentation. Given these, the analysis verdict is BENIGN wit