infrastructure
Audited by Socket on Feb 21, 2026
1 alert found:
Security[Skill Scanner] Remote file transfer via SSH/SCP/SFTP/rsync detected All findings: [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] This is a legitimate infrastructure-management skill/instructions for NixOS + Proxmox using colmena and pct. It does not contain obfuscated or obviously malicious code, downloads, or credential-exfiltration endpoints. However, it documents and enables high-privilege operations (SSH to Proxmox, pct exec into containers, restarting services, and deploying configs that use secrets). Those capabilities are appropriate for the stated purpose but pose a notable operational risk if misused or run by an attacker or in an environment without strict access controls. Recommend enforcing least privilege, protecting repository secrets, and restricting who/what can run these operations. LLM verification: The document is an operational infrastructure guide for managing Proxmox LXC containers and deploying NixOS with colmena. It contains legitimate, high-privilege operational commands but no signs of malicious code, obfuscation, hard-coded credentials, or remote download-execute chains. The main security concerns are operational: protecting SSH keys and repository/secret access, and ensuring least-privilege for deployment tooling. Treat the file as functionally benign but operationally sensitive;