autopoiesis

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Instruction to copy/paste content into terminal detected All findings: [CRITICAL] command_injection: Instruction to copy/paste content into terminal detected (CI012) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] The fragment is a high-concept, multi-language, self-modifying skill framework with trifurcation enforcement. While there is no explicit malware or credential harvesting visible in the provided content, the architecture introduces substantial complexity and potential misuse risk in real-world deployments due to heavy reliance on external tools, dynamic spawning, and cross-domain orchestration. Treat as SUSPICIOUS: the capabilities are not conventional for a benign npm/pypi skill artifact, and the data flows involve external execution and code sharing paths that warrant careful review, sandboxing, and strict permission controls before integration into a production supply chain. LLM verification: The ruler.trifurcation-enforcer Clojure code appears benign and correctly implements an in-memory enforcement policy: it does not perform I/O, network access, dynamic execution, or credential harvesting. The primary supply-chain concern arises from SKILL.md's flagged documentation patterns (curl | sh installer and copy/paste shell commands) which, if distributed with the project, create a high-risk install vector and should be removed or replaced with safer distribution methods. Additionally, mi

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:27 PM
Package URL
pkg:socket/skills-sh/plurigrid%2Fasi%2Fautopoiesis%2F@1d92cd4676b59225941ad41c988fae4c571f8ca9