debug prod issues
Audited by Socket on Feb 16, 2026
1 alert found:
Security[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] No evidence of malware or deliberate malicious behavior in the provided skill documentation. The content describes legitimate, high-privilege debugging actions (accessing Vercel logs and a production Neon Postgres DB) that are appropriate for the stated purpose, but they carry operational security risks: production credentials and sensitive data can be exposed if used without strict access controls and safe operational practices. Treat this skill as functionally benign but high-risk from an operational security standpoint; enforce least privilege, audit, and avoid pulling production env into untrusted machines or CI logs. LLM verification: No evidence of deliberate malware or hidden backdoors found in the provided content. The primary security concern is operational: the skill encourages direct local loading and usage of production credentials and printing of production data without sufficient safeguards. This poses a moderate security risk due to potential accidental credential leakage or exposure of sensitive data. Recommend adding explicit safety controls and safer workflows (read-only DB users, ephemeral credentials, redaction