workflow-tdd

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Anomaly
AnomalyLOW
phases/04-conflict-resolution.md

The code itself does not contain obvious self-contained malware (no remote shells, payload obfuscation, credential exfiltration code, or eval usage). However, it delegates heavy analysis to external CLI/AI agents by sending repository context and file lists, and then applies agent-produced modifications directly to the codebase. This design creates a medium security risk: a compromised or malicious external agent (or maliciously crafted exploration results) could cause data exfiltration or unauthorized code changes. Risk is elevated by an 'autoYes' auto-apply mode and lack of explicit validation/sanitization before applying edits. Recommend restricting data sent to external services, requiring manual approval for changes (disable autoYes), and adding validation and safe rollback (e.g., pre-change commits) before edits.

Confidence: 92%Severity: 60%
Audit Metadata
Analyzed At
Feb 27, 2026, 11:08 AM
Package URL
pkg:socket/skills-sh/catlog22%2Fclaude-code-workflow%2Fworkflow-tdd%2F@15c17084d7ba61fcad52ef9ed3d11608658d4bc4