agent-architect
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Detected system prompt override attempt The code fragment is a coherent, purpose-aligned blueprint for building an autonomous Claude Agent SDK architecture through a phased, human-in-the-loop process. It does not itself perform code execution, data exfiltration, or credential harvesting. Its security posture relies on correct implementation (restrictive tool permissions, secure storage of artifacts, explicit authentication for dashboards and MCP servers) but the fragment does not itself introduce malicious behavior. Overall, classify as BENIGN with caution: the conceptual nature and potential for misconfiguration in downstream implementations warrants careful review during actual build-out. If any risky tool access (wildcards, external MCP servers) is enabled in a real deployment, treat as SUSPICIOUS until constrained by explicit permissions and secure prompts. LLM verification: The skill itself (documentation and templates) does not contain explicit malicious code, hard-coded secrets, or obfuscated payloads. Primary risk stems from the documented expectation of high-privilege runtime capabilities (Bash, Read/Edit/Write, WebFetch, Task) combined with automated persistence of outputs (.gsd/phases/...). If these capabilities are granted without strict controls (least privilege, path restrictions, network proxies, prompt sanitization), the skill could be abused to exfiltra