container-layer

Warn

Audited by Socket on May 3, 2026

3 alerts found:

Securityx3
SecurityMEDIUM
boot.sh

This fragment is an orchestrator that performs a high-impact supply-chain action: it downloads and extracts executable Python code from an unpinned upstream GitHub source, then immediately executes a Python module from the extracted directory with an authentication token. No integrity verification (hash/signature/commit pinning) is visible, broad .env sourcing increases secret exposure risk, and passing GH_TOKEN as a CLI argument can leak credentials via process inspection/logging. No explicit malware is proven in this fragment, but the remote-code-execution pattern warrants strengthening (pin to a specific commit/SHA, verify integrity, and minimize token exposure).

Confidence: 72%Severity: 70%
SecurityMEDIUM
boot-ccotw.sh

This module is not obviously malicious by itself, but it has substantial supply-chain and execution risk: it downloads an unverified GitHub archive at runtime, extracts it, and immediately executes code from that archive; it also dot-sources .env files (executing any shell content) and can run an optional project post-boot script. If any upstream or project input is compromised, an attacker could gain code execution in the container environment.

Confidence: 72%Severity: 76%
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill's behavior mostly matches its stated purpose, but its footprint is broad: arbitrary command execution, arbitrary remote fetches, boot-time automation, and outbound snapshot uploads. GitHub is the official sink and same-account provenance exists for the skill, so this is not confirmed malicious, but it carries medium-high security risk from supply-chain exposure and potential over-capture of local environment data.

Confidence: 82%Severity: 71%
Audit Metadata
Analyzed At
May 3, 2026, 01:17 PM
Package URL
pkg:socket/skills-sh/oaustegard%2Fclaude-skills%2Fcontainer-layer%2F@3302b48fb2644556362f52877dc29ed1237019c5