container-layer
Audited by Socket on May 3, 2026
3 alerts found:
Securityx3This fragment is an orchestrator that performs a high-impact supply-chain action: it downloads and extracts executable Python code from an unpinned upstream GitHub source, then immediately executes a Python module from the extracted directory with an authentication token. No integrity verification (hash/signature/commit pinning) is visible, broad .env sourcing increases secret exposure risk, and passing GH_TOKEN as a CLI argument can leak credentials via process inspection/logging. No explicit malware is proven in this fragment, but the remote-code-execution pattern warrants strengthening (pin to a specific commit/SHA, verify integrity, and minimize token exposure).
This module is not obviously malicious by itself, but it has substantial supply-chain and execution risk: it downloads an unverified GitHub archive at runtime, extracts it, and immediately executes code from that archive; it also dot-sources .env files (executing any shell content) and can run an optional project post-boot script. If any upstream or project input is compromised, an attacker could gain code execution in the container environment.
SUSPICIOUS. The skill's behavior mostly matches its stated purpose, but its footprint is broad: arbitrary command execution, arbitrary remote fetches, boot-time automation, and outbound snapshot uploads. GitHub is the official sink and same-account provenance exists for the skill, so this is not confirmed malicious, but it carries medium-high security risk from supply-chain exposure and potential over-capture of local environment data.