uv

Warn

Audited by Socket on Mar 11, 2026

2 alerts found:

SecurityAnomaly
SecurityMEDIUM
SKILL.md

The skill is coherently aimed at guiding UV usage for Python project management and MCP server workflows, but its install instructions rely on remote installer scripts executed via curl|sh and PowerShell iex. These download-execute patterns present significant supply-chain and remote-code execution risk, especially since the installers are not verifiably signed or tied to official registries in the documentation. Given the combination of a legitimate development tooling purpose and risky installation vectors, the overall stance should be SATISFACTORILY considered suspicious-to-benign; however, due to the direct download-execute patterns and unverifiable dependencies, the footprint is not fully aligned with safe, verifiable install practices. Treat as SUSPICIOUS with a strong emphasis on credential/resource provenance checks before use in any environment.

Confidence: 98%Severity: 75%
AnomalyLOW
examples/ci-cd.md

The CI/CD fragments show standard tooling and workflow practices but hinge critically on a remote installer fetched at runtime without integrity checks. This creates a significant supply-chain and remote-code-execution risk, especially for deployment steps that publish artifacts. Recommended mitigations include enforcing installer integrity verification, pinning versions, using trusted installers or self-hosted mirrors, and minimizing external script execution in CI.

Confidence: 70%Severity: 60%
Audit Metadata
Analyzed At
Mar 11, 2026, 06:04 PM
Package URL
pkg:socket/skills-sh/s2005%2Fuv-skill%2Fuv%2F@64712f97697e2fd4957860bef8d59548063023e0