infrastructure

Warn

Audited by Socket on Feb 21, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Remote file transfer via SSH/SCP/SFTP/rsync detected All findings: [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] [HIGH] data_exfiltration: Remote file transfer via SSH/SCP/SFTP/rsync detected (NW001) [AITech 8.2.3] This is a legitimate infrastructure-management skill/instructions for NixOS + Proxmox using colmena and pct. It does not contain obfuscated or obviously malicious code, downloads, or credential-exfiltration endpoints. However, it documents and enables high-privilege operations (SSH to Proxmox, pct exec into containers, restarting services, and deploying configs that use secrets). Those capabilities are appropriate for the stated purpose but pose a notable operational risk if misused or run by an attacker or in an environment without strict access controls. Recommend enforcing least privilege, protecting repository secrets, and restricting who/what can run these operations. LLM verification: The document is an operational infrastructure guide for managing Proxmox LXC containers and deploying NixOS with colmena. It contains legitimate, high-privilege operational commands but no signs of malicious code, obfuscation, hard-coded credentials, or remote download-execute chains. The main security concerns are operational: protecting SSH keys and repository/secret access, and ensuring least-privilege for deployment tooling. Treat the file as functionally benign but operationally sensitive;

Confidence: 80%Severity: 75%
Audit Metadata
Analyzed At
Feb 21, 2026, 10:27 AM
Package URL
pkg:socket/skills-sh/fred-drake%2Fnix%2Finfrastructure%2F@07fc88beda6a5b05d7cd1be0376f538531a1cb28