chatkit-backend

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Instruction directing agent to run/execute external content All findings: [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] No direct indicators of obfuscated or overtly malicious code exist in the provided files. The primary security concern is the agent runtime (Runner/todo_agent and any tools it can invoke), which is a high-trust component capable of external network calls and side effects; it should be audited and sandboxed. Other risks: lack of input sanitization, potential stored XSS when messages are rendered, permissive CORS examples, no rate limiting, and possible log leakage. Overall: functional and coherent for purpose, but treat as moderate security risk until agent/tool implementations and operational protections are reviewed and enforced. LLM verification: This skill implements a ChatKit-compatible FastAPI backend correctly and its behavior aligns with its stated purpose. There is no explicit malicious code in the provided files. However, it introduces supply-chain and privacy risks through delegation to an external 'agents' Runner and by embedding user identifiers and conversation history into model inputs. The greatest risk is the trust boundary: the Runner/agents SDK could forward sensitive data to external model endpoints or run tools that per

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 12:28 PM
Package URL
pkg:socket/skills-sh/maneeshanif%2Ftodo-spec-driven%2Fchatkit-backend%2F@0c8f21bb42de84d663b86881818965900169f8f2