qveris

Fail

Audited by Socket on Mar 18, 2026

2 alerts found:

MalwareAnomaly
MalwareHIGH
SKILL.md

SUSPICIOUS: the skill's stated purpose matches dynamic tool search/execution, and qveris.ai appears to be the official same-org endpoint, so this is not outright malicious. However, the scope is broad for an auto-invoked skill, all requests and params are routed through a third-party aggregator, and the unseen wrapper script leaves enforcement details unclear. Risk is mainly from delegated execution and credentialed brokered access, not confirmed malware.

Confidence: 83%Severity: 68%
AnomalyLOW
README.zh-CN.md

The fragment documents a remote-install/install-and-run workflow for a Claude Code skill interfacing with QVeris, which introduces notable supply-chain and secret-management risks despite no embedded malicious code in the fragment itself. Primary risk drivers are remote installers, lack of integrity verification, and environment-based secret exposure. Actionable mitigations include signature/hash verification for installers, using pinned, signed packages, secret management (instead of plain env exports), and auditing downstream scripts (uv, qveris_tool.py) for secure handling and least-privilege.

Confidence: 80%Severity: 60%
Audit Metadata
Analyzed At
Mar 18, 2026, 04:49 PM
Package URL
pkg:socket/skills-sh/hqman%2Fqveris%2Fqveris%2F@1a09b3d97d5766fb30336b8ba501e7c877c70545