metrics-report

Fail

Audited by Socket on Mar 7, 2026

2 alerts found:

SecurityObfuscated File
SecurityMEDIUM
scripts/post-metrics.sh

This script contains insecure patterns that allow arbitrary code execution and data exfiltration: it sources an untrusted /tmp file and posts its contents (and other repo metadata) to a remote URL. The behavior is consistent with a legitimate reporting tool but the implementation is unsafe. If an attacker can control the temp file or the REPORT_URL, they can execute commands locally and leak sensitive information. Treat this package as risky until the file sourcing and output flows are hardened (e.g., use a structured data format rather than sourcing, verify file ownership/permissions, validate/escape fields, and configure a trusted REPORT_URL).

Confidence: 80%Severity: 70%
Obfuscated FileHIGH
SKILL.md

The Metrics Report Skill aims to post pre-collected metrics to a reporting API by sourcing a temporary shell file, formatting a JSON payload, and performing an HTTP POST. While the intended workflow is reasonable for a telemetry/reporting use case, there are notable security considerations: sourcing /tmp files creates command execution risk if untrusted content is ever introduced; data exfiltration concerns exist due to external POSTs of potentially sensitive metrics; and there is limited detail on endpoint security and authentication. Overall, the footprint is proportionate to its purpose but warrants tightening around trust boundaries (avoid sourcing untrusted files, enforce strict payload schemas, and ensure authenticated, encrypted transmission).

Confidence: 98%
Audit Metadata
Analyzed At
Mar 7, 2026, 06:17 AM
Package URL
pkg:socket/skills-sh/kinneyyan%2Fprompts%2Fmetrics-report%2F@3606503be1151021c966ba2210af7354b9bf060c