denuvo-slides
Audited by Socket on Feb 21, 2026
1 alert found:
Malware[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] This document is a benign project README/instructions for creating and deploying a Slidev presentation. It does not itself contain malicious code or obvious exfiltration mechanisms. Primary risks are operational: cloning an external template without auditing it, running pnpm install (supply-chain risk from dependencies), and passing deploy tokens to CLI tools. The `rm -rf .git` step erases history which can hinder auditing. Recommend auditing the cloned template and package.json/dependencies before installing or deploying, and protect tokens (do not paste tokens into untrusted shells). LLM verification: The provided instruction file is for a benign Slidev template workflow and does not itself contain direct malicious code. The primary security concerns are operational and supply-chain: (1) an explicit rm -rf .git command which destroys provenance and could hide history — avoid unless understood; (2) unpinned dependencies and lack of integrity checks when running pnpm install, which allows malicious lifecycle scripts to execute; (3) reliance on a personal GitHub template increases trust requirem