tmux
Audited by Socket on Feb 18, 2026
1 alert found:
Malware[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] BENIGN: The skill’s stated purpose (tmux-based automation and orchestration of interactive sessions) is coherent with its capabilities and data flows. It uses local, well-known tmux operations, does not request credentials, and does not appear to exfiltrate data to external services. Primary risks are user-driven exposure of sensitive terminal data, not code-driven malware or covert data collection. LLM verification: This skill's functionality is consistent with its stated purpose (controlling tmux). It is not itself obfuscated or explicitly malicious. However, because it grants the ability to inject keystrokes into terminals and capture pane output on any accessible tmux socket, it is a high-privilege capability that can be abused for credential harvesting, arbitrary command execution, and data exfiltration if given access to sockets or sessions that contain sensitive processes. The documentation is transpa