bun

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] This skill is coherent with its stated purpose and does not show signs of credential harvesting, covert exfiltration, obfuscation, or backdoors. The main security concern is operational: it instructs executing a remote installer (curl | bash) and running repository scripts that execute arbitrary code. Those behaviors are expected for a migration tool but are high-risk if run without review or in privileged environments. Recommend adding explicit warnings about verifying installers, performing changes in isolated environments (containers/CI), and code review before executing suggested commands. LLM verification: This document is a legitimate migration playbook rather than covert malicious code. It contains several high-risk operational patterns (pipe-to-shell installer, destructive rm -rf, removal/ignoring of lockfiles, and force/unpinned installs) that increase supply-chain and operational risk if followed without safeguards. There is no direct evidence of malware, data exfiltration, or obfuscation in the provided content, but the installer and package-fetching steps deserve careful verification and st

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:43 PM
Package URL
pkg:socket/skills-sh/phrazzld%2Fclaude-config%2Fbun%2F@c69bcfeea9f95d891c37b52505b9221089e6a064