@gw-autonomous-workflow

Warn

Audited by Socket on Feb 22, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] [Documentation context] Credential file access detected No explicit malicious code or obfuscated payloads found in this workflow document. The main risks are operational: it grants an agent the ability to perform networked installs and to push code/create PRs if run with credentials, which can alter remote repositories. That capability is expected for an autonomous development skill but is high-impact and should be constrained by policy (explicit user consent per run, least-privilege credentials/service accounts, optional manual push/PR creation, secrets scanning before CI/push). Recommend: (1) Only run this skill in trusted environments, (2) restrict agent push/create-PR rights (use limited tokens or require manual push), (3) add explicit secret-safety and dependency-supply-chain checks before install/push, and (4) log and surface all network operations for audit. LLM verification: [LLM Escalated] verdict: SUSPICIOUS The fragment is a comprehensive procedural template for autonomous end-to-end feature delivery with isolated worktrees. While it serves a legitimate governance purpose, embedded signals in the documentation (credential path references and npm install guidance) create potential misuse vectors if operationalized by an autonomous agent. There is no active code executing credentials or external downloads in the fragment itself, so it is not malware, but the presence of executable

Confidence: 98%Severity: 75%
Audit Metadata
Analyzed At
Feb 22, 2026, 12:57 PM
Package URL
pkg:socket/skills-sh/mthines%2Fgw-tools%2Fgw-autonomous-workflow%2F@91871752f9c4690e257706cb05d3c6aeada691de