container-optimize

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] Functionally, this skill is aligned with its stated purpose (container optimization and security guidance). I found no deliberate obfuscation, embedded secrets, or code that automatically exfiltrates data or opens remote shells. The primary security concerns are: (1) inclusion of an unpinned download-and-execute example (curl ... | sh) in the documentation/templates — a high-risk pattern if copy-pasted and executed; (2) the skill may pull and run third-party scanner images (trivy) which is expected for vulnerability scanning but requires trusting upstream images; and (3) it writes cache and .dockerignore files into the repository, which are side-effects that should be made explicit and consensual. Overall this is likely benign for its purpose but carries moderate supply-chain risk due to the documented download-execute example and external image pulls. Recommend removing or heavily qualifying the curl|sh example, requiring explicit user confirmation before writing files or invoking docker pulls, and preferring pinned scanner versions or recommending official installer flows. LLM verification: No clear malicious payload or credential exfiltration is present. The skill largely performs local analysis and file generation consistent with container optimization. However, there are multiple supply-chain risk patterns in examples (pipe-to-shell, apt/pip installs, rm -rf commands) and an inconsistency between the 'will NEVER modify Dockerfiles' promise and example scripts that create files in the repo. These make the skill a moderate security risk if users blindly execute examples or run ins

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 12:27 PM
Package URL
pkg:socket/skills-sh/manastalukdar%2Fclaude-devstudio%2Fcontainer-optimize%2F@33e1338a05a81ca38918815a4cd8945036249bc2