NYC

codex-skill

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] This skill text is primarily documentation for a CLI and does not contain directly malicious code (no obfuscation, no hardcoded secrets, no explicit exfiltration endpoints). However, it prominently documents and normalizes high-risk operational modes (danger-full-access, bypassing approvals, adding external write dirs) and encourages autonomous execution and skipping confirmations. Those features are disproportionate to many typical use-cases and create a high-risk execution path if the installed CLI or environment is untrusted. Recommendation: treat the documented 'danger-full-access' and any 'bypass approvals' flags as sensitive; avoid enabling them on untrusted machines, verify CLI binary provenance before installation, and require explicit human confirmation policies for destructive/network-capable operations. LLM verification: The document itself is not executable malware and contains no hardcoded secrets, but it considerably raises operational and supply-chain risk by normalizing broad privileges (danger-full-access, workspace-write), providing a bypass flag for safety controls, and recommending global installs without integrity checks. If the Codex CLI or dependent packages are compromised, these instructions would enable high-impact abuse (reading/exfiltrating sensitive files, installing malicious packages, executi

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 11:14 AM
Package URL
pkg:socket/skills-sh/microck%2Fordinary-claude-skills%2Fcodex-skill%2F@25ea4ebe38fd60611eadde990a5848b90f90a34d