nostr-logging-system
Audited by Socket on Mar 1, 2026
1 alert found:
SecurityThis skill implements a Nostr-based logging transport consistent with its stated purpose. The primary security concerns are operational: persisting a raw private key to a local .env file (risk of accidental commit or insufficient file permissions) and the reliance on a caller-controlled 'sensitive' flag to prevent secrets from being published. There are no clear indicators of malicious intent, no obfuscated or download-execute patterns, and no third-party credential forwarding beyond the expected use of the nostr-sdk. Treat this as functionally appropriate but operationally risky: hardening recommendations include using secure secret storage, ensuring .env is ignored by version control, explicitly specifying relays, and adding redaction/secret-detection before publishing logs.