handoff

Warn

Audited by Socket on Mar 6, 2026

1 alert found:

Anomaly
AnomalyLOW
SKILL.md

The handoff skill is feature-rich and coherently targets session handoff between Claude Code and Lark/OpenCode, including session lifecycle, permission bridging, and admin controls. However, it exhibits notable security and supply-chain risks: dependency on runtime plugin/assets, explicit sandbox bypass for network calls, broad destructive capabilities with user confirmations, and credential exposure through local config and multiple scripts. The overall posture leans toward SUSPICIOUS to HIGH risk due to the expanded trust surface, potential data exfiltration paths, and governance gaps. Recommended mitigations: enforce sandboxing for all network activity, minimize or harden credential exposure (prefer ephemeral tokens, scoped keys, or vault-backed access), restrict destructive actions with auditable approvals, implement explicit access controls and logging, and reduce transitive plugin risk by pinning trusted sources and performing integrity checks on assets. Consider a hardened, read-only or restricted-execution mode for non-admin workflows and introduce audit trails for admin commands.

Confidence: 59%Severity: 68%
Audit Metadata
Analyzed At
Mar 6, 2026, 12:37 PM
Package URL
pkg:socket/skills-sh/dinghaoz%2Fskills%2Fhandoff%2F@703738d94be37b6e6267cc4afd54edd3964eb198