agent-development

Fail

Audited by Socket on Feb 15, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
rules/custom-agent-instructions.md

The supplied fragment is not malicious code, but it prescribes an overly-permissive agent permission model that materially increases the risk of data exposure and unauthorized modification. Key risky elements: unrestricted WebFetch(domain:*), giving all tools to all agents, inclusion of Bash control-structure tokens, and write/edit commands that enable staging. Recommend applying least-privilege: remove or narrow WebFetch domain scope, restrict Bash to atomic read-only operations (avoid control tokens), separate agents by required privileges, add explicit deny-lists or protections for common secret paths, require human approval for sensitive operations, and implement logging/monitoring of agent network/file actions.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 15, 2026, 07:53 PM
Package URL
pkg:socket/skills-sh/jezweb%2Fclaude-skills%2Fagent-development%2F@57e7620058944f9f9f5111e1f6174ced0021c940