bmad-testarch-ci

Warn

Audited by Socket on Apr 26, 2026

1 alert found:

Security
SecurityMEDIUM
steps-c/step-04-validate-and-summary.md

No explicit malicious payload is visible in the fragment itself, but it contains a high-impact supply-chain design pattern: it conditionally executes a dynamically returned `workflow.on_complete` value from a resolver script as a terminal command. If resolver outputs or their inputs can be influenced (directly or indirectly) by untrusted data, this can enable arbitrary command execution in CI. The file-writing to `{outputFile}` is comparatively lower risk, but path/control of `{outputFile}` should still be validated in the larger workflow.

Confidence: 62%Severity: 70%
Audit Metadata
Analyzed At
Apr 26, 2026, 05:57 AM
Package URL
pkg:socket/skills-sh/bmad-code-org%2Fbmad-method-test-architecture-enterprise%2Fbmad-testarch-ci%2F@b37ac598e4a19ca0990d7bb1db24835c76cab01e