caching-cdn-strategy-planner
Audited by Socket on Mar 18, 2026
1 alert found:
Security[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This code is consistent with its stated purpose (caching/CDN strategy guidance) and contains no clear indicators of deliberate malicious behavior. The main risks are operational/security best-practice omissions: lack of input validation/authorization for update endpoints (possible unauthorized data modification), potential abuse of CloudFront invalidations (cost/DoS), and sensitivity around placing secrets in origin headers. These are security/operational issues rather than malware. Recommend adding authentication/authorization checks, input validation or allow-lists for fields updated via req.body, rate-limiting and quota controls around invalidation calls, explicit handling/rotation guidance for CDN_SECRET, and error handling.