terraform-aws-annotated-blueprint
Audited by Socket on Mar 1, 2026
1 alert found:
SecurityThe skill description is aligned with a legitimate goal of generating annotated Terraform templates using provider schemas and AWS docs via MCP servers. However, the footprint introduces notable supply-chain and execution risks: it relies on external binaries and MCP services (download-execute patterns), permits transitive tool installation, and creates data flows to third-party endpoints for knowledge and schema data. While not inherently malicious, the combination of download-execute patterns, external service dependencies, and potential credential exposure surfaces warrants a cautious stance. Recommend rigorous controls: pin/attest MCP server sources, require explicit user approval before external binary execution, enforce authenticated/attested endpoints, and sandbox execution to mitigate supply-chain risk. Overall risk score: moderate-high with actionable mitigations required.