ghostpatch
Audited by Socket on May 2, 2026
2 alerts found:
Anomalyx2This file itself does not contain overt malicious payload logic, but it is a command-executing dispatcher with two meaningful security risks: (1) `GHOSTPATCH_CLI` can cause arbitrary command execution if an attacker can control that environment variable, and (2) the fallback to `npx --yes @sambhram06/ghostpatch ...args` can dynamically fetch/execute third-party code at runtime. Review how `GHOSTPATCH_CLI` is set and ensure npm/npx execution is performed in a trusted environment with controlled registry/configuration; also consider input/argument handling by the invoked tool.
SUSPICIOUS. The skill's capabilities broadly match its purpose, but its real footprint depends on a remotely executed npm engine and it combines untrusted GitHub content ingestion with local code execution and file writes. Approval-gated PR publication keeps it from looking malicious, yet the supply-chain and prompt-injection exposure make it medium/high risk.