tanstack-chat-netlify

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] The provided fragment is a legitimate template/setup guide for a Netlify-hosted TanStack chat app with no embedded malicious behavior or credential handling. It demonstrates standard supply-chain interactions (clone repo, install, build, deploy) without introducing external payloads, hidden data exfiltration, or credential harvesting mechanisms. The only notable runtime consideration is authenticating with Netlify during deployment, which is user-driven and not embedded in the code. Overall, the footprint is benign and aligned with the stated purpose, though deployment steps rely on external tooling and user-provided credentials during actual usage. LLM verification: This documentation is a standard scaffold/bootstrapping guide for a Netlify + TanStack Router + Claude AI chat template. The highest risks are operational (rm -rf and fragile mv of hidden files) and supply-chain (unverified, unpinned npm installs and reliance on upstream repo). There is no evidence in the provided content of obfuscated code, credential harvesting, or active exfiltration. Treat the instructions as legitimate but exercise caution: do not run destructive commands blindly, pin or au

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 02:27 PM
Package URL
pkg:socket/skills-sh/rebyteai-template%2Frebyte-skills%2Ftanstack-chat-netlify%2F@e58e8ef8bc239ab3ef378383b5434e30bb51e8ef