Utilities
Audited by Socket on Feb 28, 2026
14 alerts found:
Securityx11AnomalyObfuscated Filex2The Browser skill description is coherently scoped around browser automation using Playwright with optional AI reasoning components and YAML-driven workflows. There are no explicit credential accesses or data exfiltration patterns evident in the fragment. The mandatory local notification hook (curl to localhost) and heavy reliance on local state (USER/SKILLCUSTOMIZATIONS, local Chrome) introduce potential local trust and control considerations, but do not, by themselves, indicate malicious intent. The biggest concerns are the potential misuse of the local notification endpoint and the risk of executing untrusted local content (Stories/Recipes) without proper integrity checks. Treat as SUSPICIOUS until formal review confirms strict content integrity and endpoint security; mitigate by restricting local customization writes, validating notifier endpoint, and implementing integrity checks for local Stories/Recipes.
This Prompting skill is primarily a documentation and template-rendering system; it does not contain obvious malicious code, remote downloads, or credential harvesting directives. However, it mandates an immediate side-effectful network call to a localhost endpoint and auto-loads user customization files from a fixed home-directory path. These behaviors are not inherently malicious but increase the attack surface: a malicious or compromised local service could collect workflow metadata on each invocation, and writable customization files could be used to influence template rendering across other skills that trust this skill. Overall risk is moderate due to mandatory side-effects and transitive trust (templates used by other skills). Recommend: (1) remove or make the localhost notification optional (or require explicit opt-in/consent per environment), (2) document and validate the customization directory contents and restrict writable permissions, and (3) ensure downstream consumers sanitize templates and never forward secrets embedded in user files.
The Cloudflare skill fragment is coherently aligned with its stated purpose (manage Cloudflare resources via MCP and Wrangler). Its reliance on official tooling and standard OAuth/token workflows is appropriate for legitimate use. The only notable concerns are (a) the mandatory curl-based localhost notification that assumes a listening service, which could fail or be misused in constrained environments, and (b) explicit token unsetting steps which, while prudent, could lead to user confusion if not clearly documented. Overall, the footprint is consistent and proportionate to the described functionality with low to moderate risk. Security risk remains mainly around environment/token handling practices and the unusual notification mechanism, but nothing indicates credential leakage or malicious data exfiltration in the provided fragment.
The Parser skill appears functionally coherent with its stated purpose of parsing content into structured JSON with entity extraction and deduplication. The only notable concern is the mandatory local curl-based notification to a localhost endpoint, which is an unusual but not inherently malicious signaling mechanism. There are no evident credential reads or external data exfiltration patterns in this fragment. Overall, the footprint is benign but warrants monitoring of the localhost signaling path to ensure it cannot be abused for covert interactions within the host environment.
The skill fragment aligns with its stated purpose of creating, editing, and analyzing Word documents using standard OOXML tooling and workflows. However, it introduces notable risk by instructing explicit reads of a sensitive local PAI context file, which could expose prompts, contacts, or preferences. The dependency surface (docx-js, Python OOXML library, LibreOffice, Pandoc, etc.) without explicit provenance/version pinning elevates supply-chain risk. Overall, treat as SUSPICIOUS with moderate-high risk; require sandboxing, strict isolation of local context reads, and verified provenance/pinning for external tools before production use.
The PAIUpgrade fragment presents a coherent, multi-threaded upgrade analysis flow that leverages local state and internal tooling to produce structured upgrade reports. The most notable risks center on the mandatory localhost notification, potential data exposure from accessing sensitive local state, and reliance on local tooling (Anthropic.ts) whose integrity depends on trusted sources. Overall, classify as MEDIUM risk with privacy-sensitive data handling and operational exposure; mitigations should include explicit per-action prompts, strict filesystem permissions, validated local endpoints, and integrity checks for local tooling.
The three reports are unsatisfactory for security analysis because none include an actual code fragment to review. Report 3 is marginally better by explicitly stating the absence of code and requesting a fragment. An improved outcome is to provide a concrete template and a clear prompt for the user to supply the code fragment so a full security assessment can be performed.
The CreateCLI skill is primarily a code-generation/documentation workflow for producing TypeScript CLIs and is not overtly malicious. However, it includes risky operational patterns: a mandatory, immediate curl POST command (network activity) executed on invocation; automatic reading of user-local customization directories; and implied file writes and package installs that could trigger transitive dependency fetches. These behaviors create a moderate supply-chain and local-execution risk. There is no direct evidence of credential exfiltration, obfuscation, or embedded malware, but the forced command execution and broad filesystem access are disproportionate without an explicit user confirmation flow. Recommend changing the mandatory curl command to an opt-in telemetry/notification step, adding explicit user consent before filesystem or network actions, and ensuring dependency pins and safe install practices are used for generated projects.
The improved assessment indicates the Documents skill is broadly aligned with its documented purpose but introduces notable local-execution and supply-chain risks due to the mandatory localhost notification, heavy reliance on mutable local resources, and lack of explicit integrity and provenance checks for local tooling. While not inherently malicious, these patterns warrant careful auditing of the localhost endpoint, enforcement of integrity verification for local tools, and constraints on where customization/data can be loaded from to mitigate risk.
The best current analysis (Report 1) provides a solid baseline for PPTX automation risks but underreports privacy/supply-chain risk given the broad local context reads and multi-tool dependencies. An improved assessment should explicitly bound context access, require user consent per action, pin dependencies, and evaluate potential data leakage pathways in composite-agent environments. Overall, treat the component as a high-surface-area PPTX automation tool with privacy and supply-chain considerations that warrant tightening, not outright malicious behavior based on the fragment.
The CreateSkill fragment is a coherent scaffold specification for managing and validating skill structures. It is not performing external data exfiltration or credential theft; the only network action is a localhost notification curl, which is acceptable in a trusted host but introduces a minor potential surface for misuse if the host environment is compromised or the notification endpoint is hijacked. Overall, the design is aligned with its stated purpose, with a moderate risk due to the local signaling requirement and customization override mechanism. Recommend reviewing the localhost notification endpoint security and ensuring explicit user consent/visibility for overrides in highly sensitive environments.
The skill is coherently aligned with its stated purpose and presents a plausible, well-scoped audio editing workflow that includes transcription, analysis-driven editing, and optional cloud polishing. Its data flows involve legitimate cloud APIs for analysis and polishing, with local notification and IPC patterns that are typical in orchestrated workflows. The pre-execution notification and environment-driven credentials are notable but not inherently malicious. Overall, the skill appears benign with moderate risk due to external API usage and the unusual local notification pattern; ensure users are informed about data leaving the local environment and validate the local notification endpoint configuration.
The fragment is a high-scope manifest routing various developer tooling capabilities to dedicated SKILL.md modules. There is no direct malicious behavior, credential handling, or network activity evident in this fragment. The scope is unusually broad for a single utility, which could raise governance and access-control concerns in practice, but from a security-in-principle perspective it remains benign provided proper modular separation and least-privilege access in the surrounding system.
This workflow spec is not overtly malicious, but it has non-trivial supply-chain and privacy risks. Primary concerns: 1) arbitrary user-supplied content is forwarded to third-party closed-source services (data exfiltration/privacy risk), 2) implied execution of external CLI tools without mandated sanitization/sandboxing (command execution risk), and 3) the 'always output' resilience approach can persist partial sensitive data and mask failures. Recommended mitigations before deployment: restrict and log which domains/content are forwarded to external services; require explicit consent or redaction for potentially sensitive content; mandate sandboxed execution for external tools and sanitize inputs to any subprocess; add API key management, encryption-in-transit verification, and rate-limiting; and make validation errors and partial outputs explicit to users/operators.