tmux

Fail

Audited by Socket on Feb 28, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

This is a practical tmux usage guide with legitimate debugging and monitoring use cases. The primary security concern is the explicit instruction to bypass local command-inspection hooks using tmux load-buffer + paste-buffer; that advice is an active evasion technique that can be used to run privileged commands (e.g., sudo) while avoiding audit/inspection. Combined with instructions to send arbitrary commands into other panes and capture their output, the document provides a clear mechanism for command execution and local data reading that could be abused by an automated agent. There are no remote download/execution patterns or external exfiltration endpoints in the text, but local privileged execution and secret-capture flows are the salient risks. Recommend removing or strongly qualifying the hook-bypass section, adding explicit warnings about executing arbitrary commands in panes (especially with sudo), and requiring explicit user confirmation before automated agents perform send-keys/paste-buffer operations against panes that may run privileged contexts.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 28, 2026, 09:01 AM
Package URL
pkg:socket/skills-sh/i9wa4%2Fdotfiles%2Ftmux%2F@1a0ce1a927f9491f224d067421ae63f433bc8343