talos-os-expert
Audited by Socket on Feb 15, 2026
1 alert found:
MalwareThis Skill is documentation and automation examples for Talos cluster operations. It is internally consistent: the capabilities match the stated purpose and the network flows use expected endpoints (Talos API, registries). No code-level malware or obfuscation is present. The main security concerns are operational: examples that run remote installer scripts via curl|sh without digest pinning, examples that write secrets to disk in CI without explicit cleanup, and several examples using --insecure which weakens TLS verification. These are risky practices that could lead to credential exposure or supply-chain compromise if copied verbatim. Recommendation: treat the document as largely benign guidance but update CI/install examples to pin installer versions/digests, avoid curl|sh where possible, demonstrate secure secret handling (in-memory usage, ephemeral files with secure deletion), and remove or clearly warn about --insecure usage in production.