esp32-serial-commands

Pass

Audited by Socket on Feb 15, 2026

Checks
Malicious behaviorInjection, exfiltration, untrusted installs
Security concernsCredential exposure, tool/trust exploitation
Code obfuscationHidden or obfuscated code
Suspicious patternsReconnaissance, excessive autonomy, resource use
Audit Metadata
Analyzed At
Feb 15, 2026, 08:44 PM
Package URL
pkg:socket/skills-sh/h1d%2Fagent-skills-esp32%2Fesp32-serial-commands%2F@9dd52e32f6c39224a3a1c499be35db03a896ee25