idempotency-handling

Warn

Audited by Socket on Feb 15, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This code is an appropriate, standard implementation of idempotency handling for APIs. It shows reasonable patterns (Redis short-term cache, DB-backed idempotency record with request hash and status) and includes cleanup strategies. There are no signs of malicious behavior or hidden data exfiltration. Operational risks are present but non-malicious: async override of res.json, potential leakage of response/error content in persistent stores, and the need to ensure proper cleanup/partitioning to avoid table bloat. Apply normal production safeguards: access controls and encryption on Redis/DB, sanitize error messages, and implement robust retry/backoff for 'processing' status. LLM verification: The code fragment presents a coherent, purpose-aligned, and industry-standard approach to idempotency handling for mutations such as payments and webhooks. While generally sound, it requires careful operational controls around cache security, TTL synchronization, and key provisioning to minimize replay risk and stale data. Overall, the implementation is pragmatic and aligns with best practices for idempotent APIs.

Confidence: 90%Severity: 75%
Audit Metadata
Analyzed At
Feb 15, 2026, 09:32 PM
Package URL
pkg:socket/skills-sh/secondsky%2Fclaude-skills%2Fidempotency-handling%2F@753f34beb8810d87a244d5893a840302e73fc0e2