caching

Warn

Audited by Socket on Feb 19, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill/document contains legitimate caching guidance and code examples. Its capabilities (access to Redis via an env URL, DB access, and HTTP request/response handling) align with the stated purpose. I found no signs of malicious behavior, credential exfiltration, obfuscated payloads, or third-party proxying. Operational cautions (redis.keys, unbounded caches) are present and documented as anti-patterns. Overall risk is low but standard operational safety and scaling cautions apply.

Confidence: 90%Severity: 75%
Audit Metadata
Analyzed At
Feb 19, 2026, 05:40 PM
Package URL
pkg:socket/skills-sh/Dsantiagomj%2FDSMJ-Ai-Toolkit%2Fcaching%2F@434ddc8f6426c8afe3ff641ee4750cd496f45845