docs-management

Warn

Audited by Socket on Mar 22, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
canonical/platform-claude-com/docs/en/agents-and-tools/tool-use/bash-tool.md

This source is documentation and example code for an LLM-integrated bash tool that intentionally executes arbitrary shell commands from tool-use messages. The content itself does not contain obfuscated malware or hardcoded credentials, but the described capability is high-risk: if deployed without strong isolation, allowlists, robust validation, and resource limits, it enables command execution, remote code fetch/install, data exfiltration, and privilege misuse. Treat this component as a dangerous capability that requires strict sandboxing and operational controls before use.

Confidence: 90%Severity: 60%
AnomalyLOW
canonical/platform-claude-com/docs/en/api/beta/messages/count_tokens.md

The content is API documentation (token-counting endpoint) and contains no executable or obfuscated malware. However, the API exposes powerful server-side capabilities (arbitrary URL fetches, code/batch/bash execution, container uploads, and MCP server callbacks) that present significant security risks if untrusted inputs are allowed or the platform's sandboxing/validation is weak. The document itself is not malicious, but implementations of these features must enforce strict protections to prevent SSRF, data exfiltration, arbitrary code execution, or abuse. Recommend auditing runtime protections, allowlists for fetch domains, strict tool authorization, sandboxing of code execution, and careful handling of MCP server tokens.

Confidence: 90%Severity: 60%
AnomalyLOW
canonical/platform-claude-com/docs/en/api/kotlin/beta/skills/list.md

The fragment reveals significant surface-area risks due to hardcoded secrets in client-side assets and heavy reliance on third-party SDKs. While no direct malware behavior is evident, the exposure of credentials and IDs could enable credential leakage or abuse if the hosting environment or third-party scripts are compromised. Recommended remediation includes sanitizing and removing embedded keys from public artifacts, migrating secrets to secure servers, rotating or tokenizing keys, and auditing all third-party integrations and iframe interactions. Overall security risk: moderate to high given exposure surfaces (approx. 0.55).

Confidence: 56%Severity: 60%
Audit Metadata
Analyzed At
Mar 22, 2026, 10:49 PM
Package URL
pkg:socket/skills-sh/melodic-software%2Fclaude-code-plugins%2Fdocs-management%2F@6bc949ed9eeee6ca2786b3d35e221bef0d855114