setup
Audited by Socket on Mar 21, 2026
2 alerts found:
AnomalyObfuscated FileSUSPICIOUS: the visible behavior mostly matches a project-setup skill, but its core purpose is to generate and facilitate installation of additional skills from unseen reference-driven commands. Because the downstream install scope is not auditable in this fragment, the transitive trust and script-execution risk make it more than benign, though there is no clear evidence of credential theft or overtly malicious behavior.
This decision matrix is not directly malicious, but it materially increases supply-chain risk if executed as-is. The combination of many third-party packages, frequent global installs, and unpinned 'latest' tags constitutes a moderate security risk: running these commands can lead to arbitrary code execution on developer machines if any referenced package (or its 'latest' release) is compromised or malicious. Recommended actions: do not run blindly — pin versions/checksums, avoid global installs where unnecessary, vet package sources, and run installs in isolated environments or CI with strict allowlists and audit steps.