a6-plugin-limit-req
Audited by Socket on Mar 9, 2026
1 alert found:
Obfuscated FileOverall, the skill content is coherent with its stated purpose: it documents how to configure the limit-req plugin (leaky bucket) via the a6 CLI, including per-second rate, burst handling, nodelay, and optional Redis-based distribution. The data flows stay within administrator tooling to APISIX and, for distributed mode, to Redis. There are no suspicious download/execution patterns or external data exfiltration mechanisms. The main security consideration is the handling of Redis credentials in configuration; recommending secure secret management and least-privilege access would improve security, but this does not constitute a misalignment with the stated purpose. Overall risk is low-to-moderate (suitable for a configuration guide); no malicious behavior is evident.