codex-team
Audited by Socket on Feb 18, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] skill_discovery_abuse: System prompt extraction attempt (SD002) [AITech 4.3] The code fragment is a coherent, purpose-aligned orchestration specification for multi-agent code editing using Codex. It presents no evidence of malicious behavior, credential harvesting, or data leakage beyond legitimate developer workflows. The footprint (backends, prompts, and output artifacts) is proportional to the stated goals of orchestrating parallel/merged/multi-wave edits and monitoring progress. Overall, the piece is benign with respect to supply-chain risk, provided the surrounding system enforces proper access controls and secrets management in actual agent prompts. LLM verification: The skill is functionally coherent and aligns with its stated orchestration purpose. It does not contain explicit obfuscated malware or hard-coded credentials in the reviewed document. However, it materially increases supply-chain and data-exfiltration risk by recommending third-party CLI installation and by demonstrating flows that send repository contents to external model endpoints. Treat this component as sensitive: require verification of the CLI package and model endpoint, restrict sandbox