teamwork
Audited by Socket on Feb 23, 2026
1 alert found:
Obfuscated FileThe 'teamwork' skill is functionally coherent for multi-model orchestration, but it poses practical security risks primarily around secret management and data exposure: (1) persistent storage of API keys (or env var names) without explicit secure-storage guidance or file-permission controls; (2) configurable provider base_url values that, if malicious or misconfigured, can exfiltrate credentials and task data; (3) peer-model evaluation and inter-model messaging that may cause unintended cross-provider data sharing. There is no direct evidence of embedded malware or obfuscated malicious code in the provided specification text. Recommended mitigations: require use of OS secret stores or encrypted config; enforce strict POSIX file permissions on .trae; validate/whitelist provider base_url values and require TLS verification; require explicit user consent before cross-provider peer-evaluations that include sensitive content; add audit logging for actions that use credentials or send context to external providers.