posthog

Warn

Audited by Socket on Feb 16, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Credential file access detected This Skill is functionally consistent with its stated purpose (full audit + remediation for PostHog). I found no evidence of embedded malware or obfuscated payloads. However, the skill requests and automates high-impact actions (setting production environment variables, deleting feature flags, and running codex exec --full-auto to modify code) and refers to executing local scripts under ~/.claude. These capabilities are disproportionate for an untrusted or fully automated agent without human review. Recommendation: treat as sensitive — require interactive human approval, restrict automated code changes, and ensure secrets and MCP write/delete operations are gated. Do not grant these actions to an untrusted autonomous agent without safeguards. LLM verification: The skill is largely aligned with its stated purpose of end-to-end PostHog lifecycle management. The core data flows and remediation patterns are consistent with production-grade instrumentation maintenance. However, the credential-reference anomaly and automation that can modify production configurations without explicit human approval raise security concerns. Recommend implementing explicit approval gates, redactable/log-sanitized outputs, and tightened secret handling (no secret printing, res

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:39 PM
Package URL
pkg:socket/skills-sh/phrazzld%2Fclaude-config%2Fposthog%2F@f36fe9ffcede9d2d78631f215137f998895d94f6