using-crabnebula-cloud-with-tauri
Audited by Socket on Feb 15, 2026
1 alert found:
Malware[Skill Scanner] Pipe-to-shell or eval pattern detected All findings: [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] Benign: The material is a legitimate integration guide for distributing Tauri apps through CrabNebula Cloud, including CI/CD and updater configuration. It involves handling of secrets (API keys and signing keys) in CI/CD contexts, which is typical for secure deployment workflows. No evidence of malicious behavior, data harvesting, or unauthorized data flow is present beyond standard credential usage in CI/CD. Ensure secrets are managed securely and endpoints are trusted, and monitor for logs that might inadvertently reveal secrets. LLM verification: BOILERPLATE-ALIGNED FOOTPRINT WITH SIGNIFICANT RISK SIGNALS. The skill matches its stated purpose at a high level but includes high-risk patterns (remote curl|sh installer, unpinned dependencies, and CI-based secret usage) that are disproportionate and potentially dangerous if executed in real environments. The truncated endpoint and reliance on third-party installers warrant scrutiny before use in a production CI/CD pipeline. Treat as SUSPICIOUS to MALICIOUS risk: suspicious due to insecure rem