langchain-retrieval-agent
Audited by Socket on Feb 21, 2026
1 alert found:
Malware[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] This is a benign-looking README for a LangChain-based retrieval agent. No explicit malicious code or obfuscated payloads are present in the provided text. The principal security concerns are operational: it asks for a high-privilege SUPABASE_PRIVATE_KEY without guidance on least-privilege, suggests removing git history (which can be misused or cause accidental data loss), and relies on third-party packages installed via pnpm (normal supply-chain risk). Recommend: review package.json and lockfile before installing, avoid giving service-role credentials to untrusted code, prefer least-privilege keys or server-side restricted credentials, and be cautious with the git-history removal step. LLM verification: This repository README/skill document appears legitimate for setting up a LangChain retrieval agent using Supabase and OpenAI. No explicit malicious code or obfuscated payloads are present in the provided fragment. However, it exposes moderate security risks: inclusion of destructive shell commands (rm -rf, brittle mv of hidden files) that can cause data loss, request for a high-privilege SUPABASE_PRIVATE_KEY without guidance on least privilege or secure storage, and lack of dependency lockfile/