provision-infrastructure-terraform
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThis skill is a legitimate Terraform IaC guide and example skill: it describes creating Terraform project structure, modules, remote state backends, drift detection, testing, and CI integration. There is no explicit malicious code, obfuscation, network exfiltration to attacker-controlled domains, or download-and-execute from untrusted URLs. The primary security concerns are expected for any IaC workflow: required cloud credentials and permissions are high-value, terraform/CI logging may expose sensitive data, and automated apply/testing steps can make privileged changes if not properly gated. Supply-chain hygiene suggestions (pinning tool versions, least-privilege IAM, sanitizing CI logs, securing S3 state buckets) should be followed. Overall, I assess this as functionally coherent but with medium operational risk due to credential scope and potential for accidental exposure or misuse if integrated without proper controls.