workflow-lite-planex
Audited by Socket on Mar 3, 2026
1 alert found:
MalwareThe second report provides a more comprehensive analysis of the workflow orchestration spec, including data flows, cross-phase context, and external tool usage. While there is no explicit malware payload, the architecture introduces significant supply-chain and data-exfiltration risk via external agent execution and append-only discovery sharing. Recommend tightening validation gates, auditing external CLI usage, constraining data in context_prev to repository-safe fragments, and adding explicit access-control and data-minimization controls before integration. If the first report lacks coverage on these aspects, adopt the second report as the baseline and implement the suggested control improvements.