pica-langchain
Warn
Audited by Socket on Feb 28, 2026
1 alert found:
AnomalyAnomalySKILL.md
LOWAnomalyLOW
SKILL.md
The document itself is an integration guide and contains no explicit malicious code. However, it recommends runtime patterns that materially increase supply-chain and credential-exposure risk: running an unpinned npm package via npx (download-and-execute) and forwarding PICA_SECRET plus PATH/HOME to a subprocess. In benign contexts this pattern is a convenience trade-off; in adversarial or high-security contexts it is a significant risk and should be mitigated by version pinning, integrity verification, least-privilege execution, and limiting forwarded environment variables. Overall, I assess this guidance as operationally useful but moderately risky if followed without supply-chain controls.
Confidence: 75%Severity: 55%
Audit Metadata