portable-extract

Fail

Audited by Socket on Mar 10, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The skill's described capabilities are coherent with its stated purpose. It reads internal 11-doc reverse-engineering artifacts, abstracts them into two tech-agnostic artifacts, and writes them to a local _portable-extract directory with YAML frontmatter. There are no credential requirements, no external downloads, and no network data flows, which keeps risk low. The only notable consideration is ensuring the mapping rules and exclusions are consistently applied to avoid leakage of any platform-specific details into the portable artifacts. Overall, the footprint is benign and proportionate to the stated objective.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 10, 2026, 06:52 AM
Package URL
pkg:socket/skills-sh/jschulte%2Fclaude-plugins%2Fportable-extract%2F@ef03f5a3693a7cbdcdc31a3a6826a61947d26b7e