aliyun-observability

Fail

Audited by Socket on Mar 11, 2026

2 alerts found:

SecurityObfuscated File
SecurityMEDIUM
SKILL.md

Overall, the skill is purpose-aligned (end-to-end Alibaba Cloud Observability setup) but comprises security-significant risks primarily due to: (1) downloading and executing an unverifiable remote installer (loongcollector.sh) from a region-specific URL, (2) dependency on environment-stored AK/SK passed to the aliyun CLI, and (3) substantial local system modifications (sudo-driven installs, /etc/ilogtail state). Given these factors, this should be classified as SUSPICIOUS rather than BENIGN, with securityRisk set at least 0.75 and malware at least 0.30 due to the unverified external binary and broad system access. Recommend mitigation: pin and verify all external binaries (hash/signature checks), use official registries for tooling where possible, minimize host-wide state changes, and audit data flows to ensure credentials are only used in authorized, auditable API calls without exposure in logs or unintended channels.

Confidence: 70%Severity: 75%
Obfuscated FileHIGH
references/collector-config.json

This configuration permits reading per-user session JSONL files from all home directories and forwarding parsed records (content and timestamps) to a remote logstore whose address is built from template variables. The snippet contains no explicit exploit code or obfuscation, but it presents a material privacy/exfiltration risk if destination variables are untrusted or mutable. Treat as a moderate security/privacy risk: safe under trusted operator control with mitigations (restrict inputs, redaction, destination whitelists), but dangerous if variables can be influenced by attackers or if session files contain secrets.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 11, 2026, 10:16 AM
Package URL
pkg:socket/skills-sh/cinience%2Falicloud-skills%2Faliyun-observability%2F@ff0b578a2cc29b7dd7e94ca8972c4fb6fe988650