zig-build-system

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] This skill is documentation and example code for Zig build.zig usage. It contains expected build-system operations: reading CLI args, invoking local codegen scripts, compiling C sources, and fetching dependencies from GitHub archives. There is no evidence of intentional malicious code or obfuscation. The primary security considerations are standard supply-chain risks: executing local scripts (addSystemCommand) and downloading external dependency archives (build.zig.zon). These are legitimate capabilities for a build system but should be treated with caution in untrusted projects (verify hashes, audit codegen scripts, avoid running unreviewed scripts). LLM verification: The document is an instructional guide for Zig build scripts and does not itself contain malicious code. Primary risks are supply-chain and local-execution patterns it demonstrates: fetching remote tarball dependencies and executing local generation scripts during builds. These are normal for build systems but are vectors for compromise if dependency URLs or generation scripts are untrusted or tampered with. Recommendations: pin and verify dependency hashes, vendor or mirror dependencies where p

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 11:07 AM
Package URL
pkg:socket/skills-sh/mohitmishra786%2Flow-level-dev-skills%2Fzig-build-system%2F@e1dce06f1517a3133c35d09c8d35c8a619d18202