tailwind-css
Audited by Socket on Feb 18, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] BENIGN: The skill/document is coherent with its stated purpose as a Tailwind CSS v4.x setup and usage guide. No malicious behavior, credential usage, or insecure data flows are present in the fragment. LLM verification: The fragment is predominantly benign and coherent with its stated purpose as Tailwind CSS 4.x guidance. It provides install steps, Vite integration, and design-token examples typical of official documentation. The static analyzer flags around .config access and install commands are contextual to documentation and do not reflect active data flows or executable payloads within this fragment. The overall risk is low provided that the content is used as guidance rather than executed automatically.