github-workflows-ollama

Fail

Audited by Socket on Mar 2, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

This GitHub Actions workflow template is generally coherent with its stated purpose (CI for RAG, Ollama, and pgvector testing). However, it includes several supply-chain risk patterns that raise a non-trivial security concern: a download-and-execute step (curl | sh) to install Ollama, unpinned container tags (including :latest), and global installation of third-party CLI tooling (npm install -g pgpm). Example hard-coded credentials (PGPASSWORD: password) are present and could encourage insecure copying. These factors make the template moderately risky for direct use in production CI without mitigation: replace curl|sh with a pinned, verified installer or package, pin container/image and package versions, avoid global installs where possible, and use GitHub Secrets for credentials. Overall, I assess low probability of intentional malware in the provided text (no explicit exfiltration endpoints or obfuscated payloads), but medium security risk due to supply-chain and credential-handling patterns.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Mar 2, 2026, 01:13 PM
Package URL
pkg:socket/skills-sh/constructive-io%2Fconstructive-skills%2Fgithub-workflows-ollama%2F@76e10ee8511d66a050ce7dd64a99a5fa79fc26cd