session-context-management

Warn

Audited by Socket on Feb 18, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Private key detected All findings: [CRITICAL] hardcoded_secrets: Private key detected (HS003) [AITech 8.2] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] BENIGN overall. The described mechanism is a coherent, self-contained session-context manager that uses standard local file IO and a conservative policy to prevent secret leakage. While some edge cases exist (gitignore drift, multi-instance ID handling, token-budget prompts), these are manageable with clear UX and validation. An implementation should strictly enforce the BLOCKING rules and provide explicit user prompts before any commit or write that could expose sensitive data. LLM verification: The skill's stated purpose (lightweight session context management) is reasonable and most capabilities align. However, the multi-instance detection that reads agent-specific local files to derive instance/session IDs is disproportionate and risky: it reads authToken data and debug filenames that can be sensitive and then uses them in tags which may be written to session files. There is no network exfiltration, but the mismatch between reading local auth artifacts and the skill's own rule to nev

Confidence: 90%Severity: 85%
Audit Metadata
Analyzed At
Feb 18, 2026, 02:46 PM
Package URL
pkg:socket/skills-sh/ilude%2Fclaude-code-config%2Fsession-context-management%2F@94331dbba41c3e26d5e033aa9f09e52d3082211d