agentic-kit-rag

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

This skill implements a standard RAG integration: it connects to a PostgreSQL (pgvector) database and to an Ollama embeddings/chat service. No direct evidence of intentionally malicious code (reverse shells, obfuscation, hardcoded attacker endpoints, or credential exfiltration to embedded remote domains) is present. The primary risks are configuration-driven: if OLLAMA_HOST is set to an attacker-controlled endpoint, sensitive prompts, documents, and embeddings will be sent externally (data exfiltration / credential forwarding risk). There is also moderate risk from unvalidated schema interpolation into SQL (identifier-level injection if env vars are attacker-controlled) and the instruction to run a setup shell script without showing its contents. Overall the code is coherent with its purpose but requires safe operational practices: validate and restrict OLLAMA_HOST, avoid running untrusted setup scripts, validate/sanitize RAG_SCHEMA, and avoid using weak example credentials in production.

Confidence: 80%Severity: 75%
Audit Metadata
Analyzed At
Feb 27, 2026, 05:34 AM
Package URL
pkg:socket/skills-sh/constructive-io%2Fconstructive-skills%2Fagentic-kit-rag%2F@ae740a141c5b938110a0c22a78927a11cd4ac755