gentleman-e2e

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This skill/documentation describes standard Docker-based E2E testing patterns and example test scripts for the Gentleman.Dots installer. The patterns and capabilities are consistent with the stated purpose. I found no explicit malicious code or obfuscation in the provided content. The primary supply-chain risk is procedural: tests copy and execute a local installer binary inside a container without showing any verification (checksums/signatures), and the test image grants passwordless sudo to the test user — both increase the blast radius if an attacker supplies a tampered binary or if images are misused outside isolated CI environments. Recommend requiring binary verification (checksum/signature) and limiting sudo scope in test images where possible.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 10:44 AM
Package URL
pkg:socket/skills-sh/gentleman-programming%2Fgentleman.dots%2Fgentleman-e2e%2F@8d6cfa06e18d573f09afc414ebf8bc9a5fc2ca9d