qa-gate
Audited by Socket on Mar 1, 2026
1 alert found:
SecurityThis skill description defines a QA gating workflow that runs local checks, optionally requests specialist reviews via subagents, and writes persistent YAML gate files. I did not find explicit malicious code patterns such as remote download-and-execute, hardcoded credentials, reverse shells, or explicit exfiltration to attacker-controlled endpoints. The primary security concern is data exposure: specialist reviews that send repository content or diffs to external subagents (models or services) could leak sensitive information (API keys, secrets, PII) unless the implementation enforces redaction, scope limits, and uses trusted endpoints. Additionally, because the skill writes persistent files into the repository and can update story files, any automation invoking this skill should ensure it runs with the least privilege necessary and that outputs are reviewed. Overall, this artifact appears functionally coherent with its purpose but carries moderate risk around transitive trust and potential credential/data exposure via specialist subagents. Recommend implementing explicit policies for what is sent to subagents (redaction/scope), running specialist reviews in trusted/private environments when handling sensitive repos, and logging/approval for writes that modify repository files.