agent-frameworks
Audited by Socket on Mar 1, 2026
1 alert found:
MalwareThis is a largely benign instructional skill describing agent frameworks and patterns, but it includes multiple insecure code examples that could lead to high-impact compromise if copied into production without changes. The most serious issue is the use of eval() on untrusted input in calculate(), which allows arbitrary code execution. Secondary concerns: runtime fetching of prompts with hub.pull (supply-chain risk), an API tool that allows arbitrary endpoints (possible exfiltration / SSRF), storing sensitive data in memory without controls, and executing model-driven tool calls without strong validation. These are not direct evidence of malware, but they are dangerous insecure practices; treat this skill as potentially harmful if used as-is and require remediation: remove eval, validate/pin remote prompts, restrict/validate endpoints, implement strict tool argument validation and memory redaction/retention controls.