logging-best-practices

Fail

Audited by Socket on Feb 15, 2026

2 alerts found:

Obfuscated Filex2
Obfuscated FileHIGH
rules/structure.md

The code is a legitimate structured-logging pattern that centralizes logger configuration and reliably emits a per-request wideEvent. It is not malicious, but it does present moderate security/privacy risk because it unconditionally logs environment metadata, request metadata, user identifiers, business objects, and error messages without demonstrated redaction or schema enforcement. If sensitive fields (PII, credentials, tokens) appear in the attached objects or environment variables, they could be captured in logs and exposed via the logging backend. Apply redaction, strict schemas, and access controls before using this pattern in production.

Confidence: 98%
Obfuscated FileHIGH
SKILL.md

This is non-executable guidance advocating 'wide event' structured logging. It is not malicious code. However, its strong emphasis on including high-cardinality identifiers, many business fields, and deployment metadata in every event — combined with lack of any redaction, minimization, sampling, retention, or access-control guidance — represents a significant privacy and security risk if adopted without safeguards. Recommend augmenting the guidance with explicit controls: sensitive-field classification and redaction, default deny-list for known secret patterns (auth tokens, cc numbers), sampling and cardinality limits, retention and access policies, secure log transport and storage recommendations, schema/versioning guidance, and cautions about including infra metadata. Apply stricter constraints for services handling sensitive data.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 15, 2026, 07:48 PM
Package URL
pkg:socket/skills-sh/boristane%2Fagent-skills%2Flogging-best-practices%2F@075c83b8bf75e6f7b7ac97b8cf752f819da7cdb7