abs-journal
Audited by Socket on Feb 16, 2026
3 alerts found:
Anomalyx3[Skill Scanner] System prompt extraction attempt BENIGN: The fragment describes a coherent, permission-limited workflow for continuing OpenSpec changes, with explicit prompts, dependency reads, and one-artifact-per-invocation safeguards. No suspicious data flows or credential handling are present. LLM verification: This skill's documented behavior is consistent with its stated purpose: it lists changes, checks status, fetches artifact instructions, reads dependencies for context, and writes one artifact to the CLI-specified outputPath. I found no evidence of obfuscated code, hardcoded credentials, network exfiltration, or explicit malicious behavior in the skill text. Security concerns are operational: the skill requires local CLI and filesystem access and can read arbitrary dependency files returned by op
[Skill Scanner] System prompt extraction attempt BENIGN: The fragment describes a coherent, permission-limited workflow for continuing OpenSpec changes, with explicit prompts, dependency reads, and one-artifact-per-invocation safeguards. No suspicious data flows or credential handling are present. LLM verification: This skill's documented behavior is consistent with its stated purpose: it lists changes, checks status, fetches artifact instructions, reads dependencies for context, and writes one artifact to the CLI-specified outputPath. I found no evidence of obfuscated code, hardcoded credentials, network exfiltration, or explicit malicious behavior in the skill text. Security concerns are operational: the skill requires local CLI and filesystem access and can read arbitrary dependency files returned by op
[Skill Scanner] System prompt extraction attempt BENIGN: The fragment describes a coherent, permission-limited workflow for continuing OpenSpec changes, with explicit prompts, dependency reads, and one-artifact-per-invocation safeguards. No suspicious data flows or credential handling are present. LLM verification: This skill's documented behavior is consistent with its stated purpose: it lists changes, checks status, fetches artifact instructions, reads dependencies for context, and writes one artifact to the CLI-specified outputPath. I found no evidence of obfuscated code, hardcoded credentials, network exfiltration, or explicit malicious behavior in the skill text. Security concerns are operational: the skill requires local CLI and filesystem access and can read arbitrary dependency files returned by op