prompt-engeneering

Fail

Audited by Socket on Mar 4, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
references/prompting-techniques.md

No direct evidence of intentionally malicious code in the document; it is an educational guide. However, it contains multiple high-risk patterns that can lead to severe compromise when reused in real systems: executing LLM-generated code with exec(), naïve propagation of secrets from .env into runtime, and sending private documents/prompts to external retrieval/LLM providers. Recommendation: remove or strongly mitigate exec() usage (replace with sandboxed interpreters, strict AST-based validators, or a vetted set of allowed operations), adopt secure secrets handling (use vaults, ephemeral tokens, avoid broad os.environ exposure), treat retrieval/agents as untrusted (redact sensitive fragments, apply data-leakage prevention, minimize sent context), and document explicit safety controls and threat model before publishing runnable examples intended for production use.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 4, 2026, 06:40 AM
Package URL
pkg:socket/skills-sh/CodeAlive-AI%2Fprompt-engineering-skill%2Fprompt-engeneering%2F@65623e69482a88d0a539d9c390a850cd38bd8ad3