server-checkup
Audited by Socket on Feb 21, 2026
1 alert found:
Security[Skill Scanner] Installation of third-party script detected All findings: [HIGH] supply_chain: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] supply_chain: Installation of third-party script detected (SC006) [AITech 9.1.4] Functionally coherent server maintenance skill that performs discovery, security auditing, hardening, package management, and reporting. No evidence of network exfiltration, hidden downloads, or obfuscated malicious payloads. However, several high-risk operational recommendations are present: creating passwordless sudoers entries, autonomous 'Auto Mode' subagents that run many privileged changes without demonstrated per-action confirmations, and batch destructive commands (apt remove, systemctl disable). These practices substantially increase the risk of privilege escalation, accidental lockout, or destructive changes if misapplied. Recommend removing or strongly guarding the passwordless sudo example, requiring explicit confirmations for Auto Mode operations, and adding safe-guards/auditing for any sudoers or package removal changes. LLM verification: The skill is coherent with its stated purpose (Linux server audit/maintenance) and contains common administrative commands and workflows. It is NOT obviously malicious code (no obfuscated payloads, no network exfiltration endpoints, no reflexive downloads via untrusted URLs). However, it prescribes high-impact privileged actions (creating NOPASSWD sudoers entries, modifying SSH config and reloading sshd, enabling system-wide unattended upgrades with auto-reboot, mass package removal) and suggest