KeePassXC Integration
Audited by Socket on Feb 21, 2026
1 alert found:
Security[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill/document is coherent and consistent with its stated purpose: local management of KeePassXC secrets via keyrings and keepassxc-cli. No direct malicious behavior or remote exfiltration is evident in the provided content. Primary security concerns are operational: (1) storing the DB password in a local keyring (convenience vs. attack surface), (2) exporting secrets into environment variables (possible leakage), and (3) automatically loading SSH keys into the system agent (broadens local access). Review the actual scripts referenced (get-keepass-secret.sh, save-keepass-password-to-keyring.sh, keepass_ops.py) before deployment to ensure they do not transmit secrets off-host or call untrusted URLs. Overall: benign design but moderate operational risk that requires review of the referenced scripts and careful handling of exported secrets. LLM verification: This skill documentation describes a plausible, coherent integration of KeePassXC with Cursor and uses appropriate OS keyrings and keepassxc-cli. I found no explicit malicious code or hidden exfiltration. However, there are multiple operational practices that increase the chance of accidental secret exposure: piping passwords into keepassxc-cli, exporting secrets into environment variables, storing the DB in a OneDrive-synced path, automatic persistent storage of the DB password in keyring, and