Linux Production Shell Scripts
Audited by Socket on Feb 15, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] The skill provides legitimate system-administration shell script templates that align with its stated purpose. There is no clear evidence of intentional malware or obfuscation. However several templates include risky patterns and insecure defaults: hard-coded database password placeholder, destructive remove operations without safeguards, network transfers and remote execution without verification, lack of input sanitization, and use of interactive password setting. These make the skill a moderate security risk if users copy scripts verbatim into production. Recommend improving examples with secure handling: avoid hard-coded credentials, add validation and dry-run flags, require explicit SSH key/host-key checks, and warn about destructive commands. Overall: expected functionality but with notable security cautions. LLM verification: The provided shell-script templates are functional for common Linux administration tasks and do not contain obvious obfuscated malware or command-and-control behavior. However, they contain insecure defaults and dangerous operations (hardcoded DB credentials, password echoing, rm -r without safeguards, potential exfiltration via rsync) that pose a meaningful security risk if used as-is in production. Treat these as development templates only: remove hardcoded secrets, add input validation and pa