mox-email-server

Warn

Audited by Socket on Mar 1, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The fragment represents a legitimate admin-focused skill description for deploying and managing a self-hosted Mox email server with Caddy integration and Docker support. There are no embedded malicious IO patterns, credential harvest paths, or autonomous actions beyond standard admin operations. The biggest concerns relate to supply-chain risk not from code in the fragment but from potential external binaries or documents it references (binaries, signed releases, or downloads) and the broad system access implied by admin commands. Without seeing actual install scripts, binaries, or embedded credentials, the risk remains elevated to cautious (suspicions exist due to deployment of services, network exposure, and TLS certificate handling), but not malicious. Recommend ensuring: - binaries are obtained from trusted, signed sources with pinned checksums; - deployment scripts use least privilege and explicit non-root execution where possible; - clear provenance for reference documents; - explicit access controls for Caddy/Mox interfaces; - auditing of health-check and admin scripts before automation in production.

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Mar 1, 2026, 07:44 PM
Package URL
pkg:socket/skills-sh/dimdasci%2Fvps-setup%2Fmox-email-server%2F@4da40da2a24b82c0c08490c7a4be8fb76ecd8181