phoenix-observability

Fail

Audited by Socket on Feb 20, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This skill/documentation appears consistent with a legitimate observability platform for LLMs. There are no signs of embedded backdoors, credential-harvesting network proxies, obfuscated payloads, or hardcoded secrets. Primary security considerations are operational: ensure PHOENIX_ENABLE_AUTH is enabled in production, protect PHOENIX_SECRET and database connection URLs from leakage, and avoid binding the server to public interfaces without proper authentication. I assess the package as benign in intent but with moderate operational risk if misconfigured. LLM verification: The fragment represents a coherent and legitimate observability stack for LLM applications. It describes typical components (OpenTelemetry integration, evaluators, and storage backends) with consistent usage patterns. Primary improvement areas are to enforce version pinning in documentation, provide secure handling guidelines for database credentials and telemetry endpoints, and clarify deployment best practices to reduce supply-chain fragility. No malware indicators detected in the provided mat

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 20, 2026, 03:20 AM
Package URL
pkg:socket/skills-sh/mguinada%2Fagent-skills%2Fphoenix-observability%2F@b4a081a3910b1de175b7cd8b78ca3fb50dd05094