nestjs

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This file is documentation and example code for a NestJS application using Drizzle ORM. It does not contain malware or covert exfiltration. The primary security issues are operational: a dangerous default JWT_SECRET fallback ('default-secret'), use of console.log for request logging, and the usual need to ensure proper DTO validation and secrets management in production. No evidence of obfuscation or malicious network endpoints was found.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 11:06 AM
Package URL
pkg:socket/skills-sh/giuseppe-trisciuoglio%2Fdeveloper-kit-claude-code%2Fnestjs%2F@5e46b79c14dfbc71981a48cb5ffc54463ae43a4b