tailwind-design-system

Warn

Audited by Socket on Feb 20, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] No malicious behavior detected in the provided files. The examples and ThemeProvider perform expected local browser operations (read/write localStorage, update DOM classes/meta tags) appropriate for a theme component. There are no network requests, obfuscated payloads, hardcoded secrets, or process/command execution. Overall this skill appears coherent with its stated purpose and benign. LLM verification: The skill fragment appears to be a documentation-rich design-system guide for Tailwind v4 with CSS-first theming and design tokens. There is no evidenced malicious activity or data leakage in the provided code snippet. Scanner anomalies likely reflect documentation artifacts rather than runtime behavior. To fully validate, require an executable artifact (package.json, build scripts, etc.) and a run-time data flow review. Overall, the footprint is benign with respect to runtime security in this e

Confidence: 85%Severity: 75%
Audit Metadata
Analyzed At
Feb 20, 2026, 07:52 PM
Package URL
pkg:socket/skills-sh/mrmps%2FSMRY%2Ftailwind-design-system%2F@acbec32115ca1776b32dad36c0c84587a4022d32