schedule
Audited by Socket on Mar 3, 2026
1 alert found:
AnomalyThis skill's specification describes a legitimate, local scheduler that reads mise/backlog and writes orders-next.json; it does not contain direct malicious code patterns (no downloads, no exec, no credential reads). The main risk is operational/autonomy: it is designed to run without user confirmation and can create orders or call adapters that trigger downstream skills or side-effects. That transitive capability broadens the attack surface depending on the trustworthiness of adapters and downstream skills. Recommend: ensure the runtime enforces least privilege (limit write access, require review or sandboxing for adapter actions in sensitive repos), audit downstream skills/adapters that the scheduler will invoke, and log/promote transparent approval for cross-boundary actions. Otherwise, the scheduler itself appears coherent with its purpose and not malicious.