coding-agent

Fail

Audited by Socket on Feb 23, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Instruction directing agent to run/execute external content All findings: [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] The file is an operations/manual-style manifest for running interactive coding agents and is not itself malicious code. However, it prescribes risky operational patterns — notably '--yolo' (no sandbox), immediate unverified installs and execute, automated commit/push flows, and outbound notifications — that materially increase supply-chain, credential, and exfiltration risk when executed or automated. Recommendation: treat this as medium-risk guidance; enforce safeguards (no --yolo in automated contexts, pin & verify dependencies, require interactive approvals for commits/pushes, restrict outbound notification hooks, isolate agent runtime and credentials) before using in production or automation. LLM verification: The file is a comprehensive operational guide for running interactive coding agents, but it promotes several high-risk behaviors: disabling sandbox/approval controls (--yolo, --full-auto), performing unpinned third-party installs, running unsupervised background agents with push capability, and forwarding logs/notifications to external endpoints. I did not find explicit obfuscated malware code in the text, but the operational guidance materially increases the risk of credential exposure, data ex

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 23, 2026, 12:58 PM
Package URL
pkg:socket/skills-sh/Heldinhow%2Fopenclaw-swarm%2Fcoding-agent%2F@1a65a25d3157fd0d6ab260f6e9ca37d320f36d17