checkpoint
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThis skill is a checkpoint manager for serializing/deserializing conversation context across local and Hapi environments. The code fragment itself operates mainly on local files (.checkpoints/*) and enforces strict rules (must READ doc files before action, environment detection). I found no direct evidence of downloading/executing remote code, hardcoded secrets, or explicit exfiltration endpoints in this fragment. The primary risks are autonomy abuse (the agent is instructed to run multiple side-effecting steps automatically after resume) and supply-chain ambiguity: Hapi integration is delegated to external docs not present here, which could contain network endpoints or credential usage that would materially change the risk. Recommended actions: audit docs/hapi-integration.md and any referenced scripts for endpoint hosts, auth flows, and any curl/pipe-to-shell patterns; ensure per-step user confirmation is required for high-impact actions; restrict the agent's tool permissions when running in 'hapi' mode. Overall, low likelihood of intentional malware in this fragment, but a medium security risk due to autonomous behavior and external Hapi integration being out-of-band.