customize-sdk-hooks

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The document accurately explains how to implement SDK hooks and provides useful examples (User-Agent injection, HMAC signing, telemetry). There is no intrinsic malicious code in the artifact, but the hook mechanism gives implementers the ability to access secrets and make arbitrary outbound requests — exactly the capabilities an attacker would exploit to exfiltrate data. The primary security concern is governance: unreviewed or malicious hooks can leak sensitive data. Apply strict review, runtime restrictions (endpoint allowlists, redaction), and monitoring when allowing custom hooks in production.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 16, 2026, 03:00 AM
Package URL
pkg:socket/skills-sh/speakeasy-api%2Fagent-skills%2Fcustomize-sdk-hooks%2F@2c858f988a75f4c0a97b4bb7f1288ac87aef1730