prompt-agent
Audited by Socket on Feb 25, 2026
1 alert found:
MalwareThe Prompt Agent deployment script implements a comprehensive, defense-in-depth approach to obtaining and validating remote security tooling, with multiple safeguards (artifact size checks, path traversal prevention, zip-bomb protection, per-file checksum validation). However, there are notable trust and control gaps: dependence on remote release artifacts without explicit per-action user consent, fallback to downloading individual files increases risk if the manifest is tampered with, and a missing definition for VERSION_TAG could cause misbehavior. The bootstrap integrity note is prudent but highlights a fundamental risk in supply-chain trust. Overall, the approach is reasonably thorough but should be tightened with explicit user prompts for installation, stronger provenance verification (e.g., signed artifacts, mandatory GPG verification), explicit per-action confirmations, and clearer handling of VERSION_TAG and hardening of open-source component trust before broad deployment.