exa-security-basics
Audited by Socket on Mar 12, 2026
1 alert found:
Obfuscated FileThe skill presents a coherent and proportionate approach to Exa secret management and access control. It aligns with the stated purpose by outlining environment-based secret handling, secret rotation, least-privilege patterns, and audit logging. While data flows include legitimate external API calls and audit endpoints, there is a non-zero risk of secret exposure if logs or dashboards capture raw keys; mitigations should be explicit (e.g., masking, avoiding log of secrets, use of short-lived tokens, and secure log handling). No unverifiable binaries or external supply-chain risks are evident. Overall, the footprint is Benign with moderate security risk due to credential exposure potential, and it remains within expected boundaries for a security-best-practices guide.