android-keystore-generation

Warn

Audited by Socket on Feb 28, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The workflow achieves its stated purpose of generating production and local development keystores and documenting setup details. However, it poses clear credential exposure risks due to plaintext password storage (KEYSTORE_INFO.txt and /tmp files) and is not CI/CD-friendly due to interactive prompts. To improve safety and automation compatibility, remove plaintext password artifacts, avoid logging or displaying passwords, shift secrets to ephemeral environment secrets, enforce non-interactive CI usage, and ensure KEYSTORE_INFO.txt either omits sensitive data or is securely protected/rotated. Maintain separate handling for production vs. local keystores and ensure proper gitignore configuration to prevent accidental leakage.

Confidence: 90%Severity: 75%
Audit Metadata
Analyzed At
Feb 28, 2026, 12:42 PM
Package URL
pkg:socket/skills-sh/hitoshura25%2Fclaude-devtools%2Fandroid-keystore-generation%2F@50a806bc0587b385bd4fa3339def85fec3854447