sensei

Warn

Audited by Socket on Mar 27, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/src/gepa/auto_evaluator.py

Best report selection: Report 3 is the strongest and most accurate overall because it identifies the unusual credential repurposing (gh token -> OPENAI_API_KEY) and clearly ties it to likely downstream remote inference, while also noting a frontmatter parsing anomaly (correctness, not malware). Improved finding: This module itself does not show classic malware behaviors, but optimize_skill() creates a high-sensitivity credential flow: it harvests a GitHub token via `gh auth token`, repurposes it as an OpenAI API key, sets a remote inference endpoint, and then passes repository content to an external optimizer/LLM client. Review gepa/LLM client behavior, token scope/format, and ensure sensitive content is not sent unintentionally; also consider fixing the frontmatter parsing logic to avoid incorrect scoring/optimization inputs.

Confidence: 66%Severity: 57%
Audit Metadata
Analyzed At
Mar 27, 2026, 11:12 AM
Package URL
pkg:socket/skills-sh/spboyer%2Fsensei%2Fsensei%2F@990f176fd18185b66c662c9f172f9466654da31a