authoring-dags
Audited by Socket on Feb 17, 2026
1 alert found:
Anomaly[Skill Scanner] Skill instructions include directives to hide actions from user This skill is functionally coherent with its stated purpose: authoring, validating, and testing Airflow DAGs using a managed MCP interface. I found no code, obfuscated payloads, hardcoded secrets, or explicit exfiltration paths in the provided text. The main security consideration is operational: the skill enforces exclusive use of the MCP service for all interactions — this centralizes access to DAG source, connections, and variables through the MCP operator. If the MCP service is run and controlled by a trusted internal operator with proper access controls and auditing, the design is reasonable. If the MCP endpoint is a third-party or uncontrolled service, that centralization raises data-leak and trust concerns. Overall there is low probability of malicious intent in this document, but moderate operational risk if MCP is untrusted. LLM verification: BENIGN with low-to-moderate transparency concern due to a potential directive to hide actions in ancillary files. The visible content supports secure, tool-driven DAG authoring without evident data flows or credentials. Address the scanner note on hidden actions to improve trust and auditability. Overall, the fragment is appropriate and low-risk for consumption, assuming MCP tools are trusted.