NYC

pw-image-generation

Fail

Audited by Socket on Feb 15, 2026

2 alerts found:

Obfuscated FileMalware
Obfuscated FileHIGH
config/secrets.md

The file is a configuration template that contains a hard-coded API key and points to an external API domain. It is not executable malware, but the exposed credential creates a moderate supply-chain security risk (unauthorized API usage, data exposure, and financial/resource abuse). Treat the key as compromised, rotate it, remove secrets from checked-in templates, and verify the trustworthiness of the target domain before use.

Confidence: 98%
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] hardcoded_secrets: Hardcoded API key detected (HS001) [AITech 8.2] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This SKILL.md is documentation for an image-generation skill; the described capabilities are consistent with its stated purpose and there is no direct evidence in the documentation of obfuscated or malicious code. However, there are legitimate supply-chain and privacy risks: defaulting to a third-party public image host (freeimage.host/iili.io), allowing user-configurable API endpoints (which could be misconfigured or malicious), and recommending npx -y bun (auto-download) increase the attack surface. Treat the scripts as potentially risky until their source is audited — specifically verify that API requests are sent only to expected endpoints and that uploads are intentional. Overall I classify this as suspicious/low-risk in absence of the actual script code: functionality is appropriate but the data flows require careful validation by the user. LLM verification: This SKILL.md describes a plausible and coherent image-generation workflow. The documented capabilities match the expected file access (prompts, local images) and external operations (calling image APIs, uploading files to an image host). No clear malicious code is present in the provided documentation. However, there are moderate supply-chain and privacy risks: users are asked to store API keys locally (config/secrets.md), scripts are executed via npx -y bun (which downloads runtime code), and

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 15, 2026, 09:00 PM
Package URL
pkg:socket/skills-sh/plugins-world%2Fpw-skills%2Fpw-image-generation%2F@f2705d72a8308afd3886df32276706efb9ae27c5