app-platform-router
Audited by Socket on Feb 27, 2026
4 alerts found:
Malwarex2Securityx2This devcontainer skill is generally coherent with its stated purpose: mapping App Platform specs to local docker-compose profiles, populating environment variables, and initializing a VS Code devcontainer. The primary risks are supply-chain related (un-pinned git clone of the reference repo and unpinned feature/image pulls from ghcr.io), and credential exposure from example plaintext credentials and local env files. The initialize/post-create scripts are lifecycle hooks that can execute arbitrary commands and must be audited before use. No explicit malicious code or exfiltration endpoints are present in the provided documentation, but the standard devcontainer patterns here mean users should review remote scripts and avoid committing real secrets. Overall risk is moderate but manageable with standard precautions: pin commits/digests, inspect init/post-create scripts, and avoid copying example credentials into production or shared repos.
This SKILL.md is documentation for configuring DigitalOcean managed database services and appears functionally consistent with that purpose. There is no sign of malicious code or supply-chain attack patterns (no download-and-execute, no unknown remote endpoints, no credential forwarding to third parties). Security risks are operational: bindable variables expose PUBLIC hostnames even with VPC enabled, and examples embed credentials in connection strings (common but risky if app specs or logs are exposed). Operators should ensure secrets are protected, avoid logging envs, use private endpoint variables when needed, enforce least-privilege database users, and rotate credentials. Overall assessment: not malicious but moderate security caution advised due to credential exposure patterns and potential for misconfiguration.
The SDK and documentation describe a legitimate, high-privilege capability: executing arbitrary code inside container sandboxes and managing pooled containers. The documentation fragment itself does not contain explicit malicious payloads, but it exposes multiple supply-chain and operational risks: unvetted container images (personal GHCR registry), permission/credential handling (doctl usage without least-privilege guidance), unrestrained network egress and public endpoints, and state leakage risks from hot pools. Treat this as a moderate security risk for operators who do not apply strict controls. Recommended mitigations: enforce signed/vetted images or an allowlist, require image provenance checks (e.g., cosign), document and enforce least-privilege API tokens and token handling, implement egress allowlists and network policies for sandboxes, ensure deterministic filesystem reset/snapshot isolation for pool reuse, provide default authentication for exposed ports, and add monitoring/auto-delete policies for abandoned sandboxes.
This script is a destructive administrative tool for removing a tenant (terminating connections, dropping owned objects/user/schema, and deleting a connection pool via doctl). I find no strong indicators of malware (no obfuscation, no exfiltration, no remote backdoor). The code is, however, dangerous: it performs irreversible destructive actions and is syntactically corrupted/truncated in the provided fragment, which increases the chance of unexpected behavior or runtime errors. Before use: restore/fix the truncated functions, review and validate admin_connection and cluster_id, and test in a safe environment. Treat as high-risk operationally but not intentionally malicious based on the given code.