autonomous-cloud-orchestration
Audited by Socket on Feb 15, 2026
1 alert found:
Security[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The fragment is documentation-driven and benign in intent, outlining legitimate deployment and credential-management workflows for AWS Bedrock AgentCore. While there is no executable logic, the material requires careful operational controls around credential handling, rotation, and MCP tooling usage to avoid misconfigurations. Implementations should enforce least-privilege IAM policies, secure secret storage, and validated MCP tooling to mitigate risk. LLM verification: The provided fragment is documentation for a legitimate orchestration/control-plane skill integrating multiple AWS services. There are no direct signs of malicious code or obfuscation in the text. Primary risk stems from high privilege requirements and unspecified secret-handling implementation details. Before trusting package code, audit the implementation that (a) handles credentials and credential providers, (b) performs local file access to ~/.aws, and (c) configures external endpoints for g