oasis-server-setup

Fail

Audited by Socket on Feb 24, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] URL pointing to executable file detected All findings: [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] [CRITICAL] command_injection: URL pointing to executable file detected (CI010) [AITech 9.1.4] Overall, the content is a legitimate integration guide with acceptable risk if secret handling is correctly enforced. The main security considerations involve proper handling of client-exposed keys and signing/CI keys to prevent leakage or misuse. No malicious behavior detected in the fragment itself; treat as benign with strict secret management requirements. LLM verification: The document is a legitimate and detailed integration guide for Oasis with Tauri. I found no explicit malicious code, hard-coded secrets, or obfuscated/backdoor behavior in the provided documentation. The primary security concerns are operational: (1) unpinned SDK dependency increases supply-chain risk, (2) the update flow requires strict client-side signature verification and safe CI private key handling to avoid arbitrary code execution, and (3) crash/feedback collection can leak PII unless be

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 24, 2026, 01:27 PM
Package URL
pkg:socket/skills-sh/porkytheblack%2Fcoco%2Foasis-server-setup%2F@2ca6215262a52d49d0cc1f8ac9ecac8525aa9a76