win-mouse-native

Warn

Audited by Socket on Mar 29, 2026

1 alert found:

Anomaly
AnomalyLOW
win-mouse.cmd

This batch file is a thin delegating launcher that executes a bundled PowerShell script from a relative path while bypassing PowerShell execution policy and passing through arbitrary command-line arguments. The wrapper itself shows no direct malicious actions, but the policy bypass, lack of script integrity verification, and argument passthrough make it a potentially suspicious supply-chain pattern pending review of scripts\win-mouse.ps1 for actual behavior (e.g., spying, persistence, or exfiltration).

Confidence: 60%Severity: 62%
Audit Metadata
Analyzed At
Mar 29, 2026, 09:22 PM
Package URL
pkg:socket/skills-sh/sarfraznawaz2005%2Fagent-skills-collection%2Fwin-mouse-native%2F@9cd3c6112b90384e76bc2e3c6b3a15bc1b2095b6