debug prod issues

Warn

Audited by Socket on Feb 16, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] No evidence of malware or deliberate malicious behavior in the provided skill documentation. The content describes legitimate, high-privilege debugging actions (accessing Vercel logs and a production Neon Postgres DB) that are appropriate for the stated purpose, but they carry operational security risks: production credentials and sensitive data can be exposed if used without strict access controls and safe operational practices. Treat this skill as functionally benign but high-risk from an operational security standpoint; enforce least privilege, audit, and avoid pulling production env into untrusted machines or CI logs. LLM verification: No evidence of deliberate malware or hidden backdoors found in the provided content. The primary security concern is operational: the skill encourages direct local loading and usage of production credentials and printing of production data without sufficient safeguards. This poses a moderate security risk due to potential accidental credential leakage or exposure of sensitive data. Recommend adding explicit safety controls and safer workflows (read-only DB users, ephemeral credentials, redaction

Confidence: 85%Severity: 75%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:41 AM
Package URL
pkg:socket/skills-sh/different-ai%2Fagent-bank%2Fdebug-prod-issues%2F@3f7c8d26b25db4c567d64f318126d8657f6d0f74