tmux
Audited by Socket on Feb 18, 2026
1 alert found:
Malware[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] This skill is a benign, well-documented guide for controlling tmux sessions. It does not contain obfuscated code, hardcoded secrets, or embedded network exfiltration. However, its capabilities (send-keys and capture-pane) enable arbitrary command execution and terminal-data reads on the host if misused. The material is internally consistent with its purpose, but operators should treat access to the skill/tools as highly privileged: restrict who/what can drive send-keys, protect socket directories, and avoid targeting panes running sensitive shells or processes. LLM verification: This SKILL.md is documentation for a tmux orchestration skill whose capabilities align with its stated purpose: controlling tmux sessions (send-keys, capture-pane, session management). There is no evidence of obfuscation, hard-coded secrets, or direct network exfiltration instructions in the supplied text. However, the skill inherently grants a high level of control over the host: sending arbitrary keystrokes into shells/TUIs and reading their output. That power can be abused to execute arbitrar