infrastructure-monitoring-setup

Fail

Audited by Socket on Feb 24, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] This skill is functionally coherent and aligns with its stated purpose of setting up monitoring with ntfy.sh and optional Home Assistant integration. I found no direct indicators of malware, remote installer chains, or credential exfiltration to unknown third parties in the instruction text. Main risks are operational: storing long‑lived HA tokens in plaintext .env, using discoverable ntfy topics, and granting the monitoring script permission to restart Docker containers (privilege/availability risk). Full review of the referenced monitoring script and systemd unit files is required to rule out hidden exfiltration or unsafe behaviors. LLM verification: The skill is functionally coherent with its stated purpose and does not contain evidence of active malware or clandestine data exfiltration. However, it contains several operational security risks: storing long-lived HA tokens in plaintext .env, use of bearer-style ntfy topics that can be subscribed to by anyone who knows them, and high-privilege system operations. These are legitimate features for this use-case but must be treated as sensitive: do not commit .env to version control, restrict ac

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 24, 2026, 05:27 PM
Package URL
pkg:socket/skills-sh/dawiddutoit%2Fcustom-claude%2Finfrastructure-monitoring-setup%2F@e0b6d2c3b67131fe6786be32c7a421a6760f1400