gh-aw-adoption
Warn
Audited by Socket on Mar 1, 2026
1 alert found:
SecuritySecuritySKILL.md
MEDIUMSecurityMEDIUM
SKILL.md
The analyzed fragment presents a coherent, purpose-aligned specification for gh-aw adoption. It describes a legitimate automation workflow lifecycle (investigate, create in parallel, validate, deploy) using standard tooling (gh CLI, gh-aw extension). No malicious payloads or credential harvesting are evident in the manifest. Operational risk exists due to automation scale and permission requirements; mitigate with least-privilege, secret governance, and change auditing.
Confidence: 75%Severity: 75%
Audit Metadata