dotnet-run-file

Fail

Audited by Socket on Feb 17, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Instruction directing agent to run/execute external content The content is a coherent and purpose-aligned guide for executing C# scripts via dotnet run with optional directives. It is benign in purpose but introduces inherent security considerations around running untrusted code and dynamic dependencies. Implement sandboxing and access controls when deploying this capability in automation. LLM verification: The provided document is a legitimate usage guide for dotnet run-file functionality. It does not contain malicious code itself, but it documents patterns that execute arbitrary code and fetch third-party packages — operations that carry significant security risk when inputs or packages are untrusted. Recommend adding explicit security guidance, package verification advice, and sandboxing recommendations to reduce the supply-chain and execution risk.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 17, 2026, 12:18 AM
Package URL
pkg:socket/skills-sh/nikiforovall%2Fgithub-copilot-rules%2Fdotnet-run-file%2F@e4bd6c5dc91840875dc7ad278989865fea0179a9