skill-iter-tune
Audited by Socket on Mar 11, 2026
2 alerts found:
Anomalyx2This code is a benign orchestration layer whose purpose is to apply evaluation-driven changes to project files via an automated agent. It does not itself contain obfuscated malware, credential harvesting, or network exfiltration. However, it delegates powerful file-modifying privileges to a general-purpose Agent using prompt-based instructions without strong validation, sandboxing, or post-change verification. That design introduces a moderate supply-chain security risk: if the Agent or input state is compromised or manipulated, arbitrary malicious modifications could be made to skill files and persisted. Mitigations would include sanitizing suggestion content, verifying target_file existence and allowed file paths, performing diffs/checksums and human review before committing changes, and restricting Agent capabilities.
This code fragment is not directly implementing classic malware (no reverse shells, no direct network sockets or system destruction). However it poses a moderate to high supply-chain confidentiality risk: it aggregates local skill/source files and test scenario content into prompts and sends them to an external tool (via 'ccw cli --tool claude'), which can exfiltrate proprietary code, secrets, or PII to a third party. Additional risks: limited shell-escaping could allow injection depending on the ccw wrapper, using run_in_background increases exposure, and chain propagation of artifacts can repeatedly leak secrets. If the ccw binary or remote LLM provider is compromised or untrusted, this flow could be exploited. Mitigations: avoid sending secrets, sanitize and minimize prompt content, enforce allowlists, validate ccw binary provenance, add stricter escaping or use safer APIs (not shell command composition), and limit background run privileges.