pir
Audited by Socket on Mar 13, 2026
2 alerts found:
AnomalyObfuscated FileSUSPICIOUS: the core PIR purpose is plausible, but the footprint is broader than necessary because it uploads combined incident and codebase material to NotebookLM and depends on unreviewed sub-skills. Main risk is sensitive operational data leaving the local environment, not confirmed malware.
This orchestration fragment is not itself malware, but it creates a high-risk data-exfiltration pathway by uploading potentially sensitive incident and investigation reports to an external skill (nlm-skill) without redaction, scoping, or destination validation. Treat the workflow as acceptable only if nlm-skill is fully trusted and approved; otherwise add explicit safeguards (allowlist, secret scanning/redaction, interactive confirmation, audit logging) before enabling automatic uploads. The immediate security concern is confidentiality leakage rather than active malicious behavior or obfuscated code.