dotnet-build-analysis
Audited by Socket on Feb 24, 2026
1 alert found:
Malware[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] Chosen report (Report 1) provides the strongest foundation for a practical, triage-focused guide. The improved version adds concrete checklist-style guidance, explicit snippet examples (e.g., a minimal Directory.Build.props snippet, a targeted MSBuild/nuget diagnostic triage flow), and a succinct risk-scoring rubric to aid developers and CI engineers in quickly assessing and mitigating build-time issues. Overall, the artifact remains a benign, documentation-oriented security-conscious guide for supply-chain build analysis. LLM verification: This file is documentation for diagnosing .NET build/restore/analyzer problems. There is no executable or obfuscated malicious code in the skill itself. However, it contains operational instructions that can introduce supply-chain and credential exposure risk: (1) recommending download-and-run of remote install scripts (aka.ms links) and (2) advising storing PATs in clear text in NuGet configuration. These are legitimate remediation steps in some contexts but represent high-impact operational ri