agent-resource-allocator
Audited by Socket on Mar 1, 2026
1 alert found:
SecurityThe provided Resource Allocator skill contains benign-looking adaptive allocation, predictive-scaling, profiling and circuit-breaker logic; there is no direct evidence of obfuscated or malicious code, remote download-and-execute payloads, or credential harvesting inside the snippets. The main security concerns are operational: (1) use of 'npx claude-flow' in the documented commands creates a transitive install/supply-chain risk because npx downloads and runs code from npm at runtime; (2) the agent invokes high-impact control-plane APIs (mcp.daa_resource_alloc, mcp.swarm_scale, topology_optimize) — if executed without strict authorization and operator consent these calls can disrupt infrastructure (autonomy abuse). I rate this skill as low likelihood of containing malware but moderate supply-chain/operational risk; recommend ensuring strict runtime authentication, human-in-the-loop approval for scaling actions, pinning and auditing any CLI packages invoked via npx, and reviewing the implementation of mcp APIs before granting the agent permission to execute them.