hook-creator
Fail
Audited by Socket on Mar 5, 2026
1 alert found:
Obfuscated FileObfuscated FileSKILL.md
HIGHObfuscated FileHIGH
SKILL.md
The code/documentation itself is legitimate guidance for a hook system but documents high-risk capabilities: arbitrary shell execution, runtime downloads (npx), persistent logging, and agent-control via exit codes. These are normal for such a system but materially increase supply-chain and local-risk if hook configs or the loader are compromised. Recommend restricting write access to hook config files, requiring signing or explicit user approval for new/changed hooks, avoiding unpinned runtime package downloads (pin versions or vendoring), sandboxing hook execution, and limiting network access from hooks.
Confidence: 98%
Audit Metadata