mise-expert

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Pipe-to-shell or eval pattern detected (CI013) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] BENIGN: The fragment is a comprehensive specification for a development environment management skill (mise) with migration paths, task patterns, and CI/CD integration guidance. It presents capabilities and usage patterns consistent with the stated purpose. No runtime code or covert data flows are present that would indicate malicious behavior. Potential external calls in examples (e.g., Slack notifications) are configuration-time patterns and depend on user activation; secrets handling is described with reasonable safeguards (e.g., .env files). Overall footprint is coherent and proportionate to the intended purpose. LLM verification: This skill document describes a benign-seeming development environment manager and provides many legitimate configuration examples. However, it includes several risky operational patterns in its examples — notably 'curl https://mise.run | sh', multiple 'rm -rf' usages, and chmod 777 — which are dangerous if executed without inspection. The document itself does not show explicit malicious behavior (no embedded exfiltration or obfuscation), but the presence of pipe-to-shell installer instructions

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 09:55 AM
Package URL
pkg:socket/skills-sh/samhvw8%2Fdot-claude%2Fmise-expert%2F@cc2778e4ad1050c7c3d070aef9e2d6e09ea174dc