harness-keycloak-auth

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

This Harness skill's capabilities align with its stated purpose: it automates Keycloak admin tasks (client creation/updating, realm import) and integrates secrets into AWS Secrets Manager for use by EKS workloads. I found no evidence of obfuscated code, download-and-execute chains, or calls to suspicious third-party domains. The primary security concerns are operational: the skill requires high-privilege Keycloak admin credentials and AWS permissions, and it forwards secrets through the pipeline runner (Keycloak client secret -> pipeline -> AWS Secrets Manager). These behaviors are expected for the use case but increase risk if the pipeline environment, variables, or runner credentials are compromised or misconfigured. Recommend ensuring least-privilege IAM for the runner, restricting Keycloak admin credentials to a dedicated automation account, enabling secret redaction in logs, and using fine-grained AWS Secrets Manager permissions (limit put-secret-value to expected secret ARNs).

Confidence: 85%Severity: 75%
Audit Metadata
Analyzed At
Feb 27, 2026, 07:30 PM
Package URL
pkg:socket/skills-sh/lobbi-docs%2Fclaude%2Fharness-keycloak-auth%2F@d461e4ea339533ce7559d7576280254365d93ebb