authoring-dags

Warn

Audited by Socket on Feb 17, 2026

1 alert found:

Anomaly
AnomalyLOW
SKILL.md

[Skill Scanner] Skill instructions include directives to hide actions from user This skill is functionally coherent with its stated purpose: authoring, validating, and testing Airflow DAGs using a managed MCP interface. I found no code, obfuscated payloads, hardcoded secrets, or explicit exfiltration paths in the provided text. The main security consideration is operational: the skill enforces exclusive use of the MCP service for all interactions — this centralizes access to DAG source, connections, and variables through the MCP operator. If the MCP service is run and controlled by a trusted internal operator with proper access controls and auditing, the design is reasonable. If the MCP endpoint is a third-party or uncontrolled service, that centralization raises data-leak and trust concerns. Overall there is low probability of malicious intent in this document, but moderate operational risk if MCP is untrusted. LLM verification: BENIGN with low-to-moderate transparency concern due to a potential directive to hide actions in ancillary files. The visible content supports secure, tool-driven DAG authoring without evident data flows or credentials. Address the scanner note on hidden actions to improve trust and auditability. Overall, the fragment is appropriate and low-risk for consumption, assuming MCP tools are trusted.

Confidence: 80%Severity: 50%
Audit Metadata
Analyzed At
Feb 17, 2026, 08:04 AM
Package URL
pkg:socket/skills-sh/rory-data%2Fcopilot%2Fauthoring-dags%2F@d186d9fcddfa16040e595fe77689b02d7f8fd515