execute-task
Audited by Socket on Feb 28, 2026
1 alert found:
SecurityThis skill is coherent with its stated purpose (orchestrating task execution, generating task documents, dispatching specialist agents, and running verification). It does not contain explicit malicious code (no curl|bash download-execute, no hardcoded exfiltration endpoints, no obfuscated payloads). However, it raises several supply-chain and operational-security concerns: mandatory transitive Skill() calls and subagent dispatch create a broad trust surface where third-party skills or subagents could read repository files, run arbitrary scripts, and make network calls that may exfiltrate data or misuse credentials. The required external MCP queries (context7, firecrawl) and allowance for running package scripts increase the risk of prompt-injection and credential forwarding if responses or tooling are not tightly constrained. Overall I assess a moderate security risk driven by transitive skill usage and remote fetching; this is not confirmed malware but requires strict operational controls (whitelisting skills, auditing subagent behavior, restricting access to secrets, and validating all external content) before use in a sensitive environment.