pci-compliance
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The code/documentation fragment is largely benign and coherent with its stated goal of PCI DSS guidance. It demonstrates standard best practices for tokenization, data minimization, encryption, access control, and auditing. The main concern is the presence of hardcoded key placeholders and insecure key handling in examples; these are typical in tutorials but must be clearly protected in real implementations (use environment variables or a KMS, do not hardcode secrets). No evidence of malicious behavior or data exfiltration is present in the provided material. LLM verification: This SKILL.md file is documentation with example code for PCI compliance and tokenization. I found no signs of deliberate malicious behavior, obfuscation, or covert exfiltration. However, the examples contain insecure or incomplete patterns that could cause developers to accidentally mishandle cardholder data or credentials (hardcoded API key placeholder, in-memory vault storage, raw test card in comments, undefined SecurityError and missing imports, truncated AESGCM example). Treat the content