pir

Fail

Audited by Socket on Mar 13, 2026

2 alerts found:

AnomalyObfuscated File
AnomalyLOW
SKILL.md

SUSPICIOUS: the core PIR purpose is plausible, but the footprint is broader than necessary because it uploads combined incident and codebase material to NotebookLM and depends on unreviewed sub-skills. Main risk is sensitive operational data leaving the local environment, not confirmed malware.

Confidence: 82%Severity: 68%
Obfuscated FileHIGH
steps/step3b-generate-nlm.md

This orchestration fragment is not itself malware, but it creates a high-risk data-exfiltration pathway by uploading potentially sensitive incident and investigation reports to an external skill (nlm-skill) without redaction, scoping, or destination validation. Treat the workflow as acceptable only if nlm-skill is fully trusted and approved; otherwise add explicit safeguards (allowlist, secret scanning/redaction, interactive confirmation, audit logging) before enabling automatic uploads. The immediate security concern is confidentiality leakage rather than active malicious behavior or obfuscated code.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 13, 2026, 09:15 PM
Package URL
pkg:socket/skills-sh/delexw%2Fclaude-code-misc%2Fpir%2F@145bee37c55041072d34fbb48b829a48c5dd565f