allow-permissions
Audited by Socket on Mar 6, 2026
1 alert found:
Obfuscated FileFunctionally the skill matches its stated purpose and contains reasonable high-level safeguards (deny patterns, duplicate checks, user confirmation for sensitive commands). The main residual risks are automatic screenshot scanning, excessive wildcard generalization that grants broad Bash/Read permissions, and executing validation commands without strict input sanitization. Recommend: require explicit per-file consent for local screenshots, present OCR-extracted text and proposed normalized permissions for user approval, default to least-privilege (no wildcarding unless approved), perform safe/argumentized validation (no shell interpolation), back up settings.json before changes, and log/audit all modifications. Treat as medium security risk until these mitigations are enforced.