ci-autofix-reusable

Warn

Audited by Socket on Mar 9, 2026

1 alert found:

Anomaly
AnomalyLOW
REFERENCE.md

No explicit malware (reverse shell, obfuscation, hardcoded credentials, or exfiltration code) is present in the repository workflow YAML itself. However, this workflow grants an external LLM agent network access to CI logs and broad repository write permissions (git push, gh pr create, gh api). That creates a significant supply-chain risk: if the external model, its credentials, or the prompt/agent is compromised or misused, sensitive data could be exfiltrated and malicious or unwanted repository changes could be made. Use of this pattern should be carefully controlled (restrict tool scopes, sanitize logs, require human approval for PRs) to reduce risk.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 9, 2026, 08:13 PM
Package URL
pkg:socket/skills-sh/laurigates%2Fclaude-plugins%2Fci-autofix-reusable%2F@baa65454ec273053d6345e248487f4dcc1602f4f