destructive-command-guard

Fail

Audited by Socket on Feb 24, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

This skill's stated purpose and described capabilities are coherent and appropriate for a destructive-command guard. No direct malicious behavior is present in the documentation: it does not request sensitive credentials, perform telemetry, or instruct runtime exfiltration. However, there are notable supply-chain and operational risks: the quick-install curl|bash pattern and installing from a personal GitHub repo increase the chance of a compromised installer; the documented DCG_BYPASS environment variable is a high-value escape hatch that could be abused. The hook's limitation (it does not inspect commands inside scripts) is an evasion vector. Recommend treating this as a moderately risky component: require review of the installer script, prefer pinned/git-tagged cargo installs or signed prebuilt binaries, and avoid persistent DCG_BYPASS usage. Verify the GitHub repository and install scripts before use.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 24, 2026, 08:38 PM
Package URL
pkg:socket/skills-sh/oakoss%2Fagent-skills%2Fdestructive-command-guard%2F@516cdb3d64e3f428a20d697bd663032f683f1560