nextjs-blog-netlify
Audited by Socket on Feb 21, 2026
1 alert found:
Malware[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] BENIGN: The fragment describes a conventional, harmless setup/deploy workflow for a Netlify-based Next.js blog template. There are no evident malicious patterns (no hidden data exfiltration, no credential harvesting, no suspicious URL usages beyond standard public registries and Netlify). Security risk is present due to typical external network operations (package fetches and deployment) but proportional to the stated purpose. No obfuscation or malware indicators detected. LLM verification: This skill documentation is largely benign and consistent with its stated purpose (bootstrapping and deploying a Next.js blog to Netlify). However, it includes dangerous shell operations (rm -rf and an unsafe mv pattern) and relies on unpinned external sources (git clone of the default branch and npm install). Those patterns present supply-chain and accidental-destructive risks: if run in the wrong directory or if upstream packages are compromised, they could lead to data loss or arbitrary code