bad
Audited by Socket on Apr 21, 2026
3 alerts found:
SecurityMalwarex2SUSPICIOUS. The skill is largely purpose-aligned for autonomous development and uses official tooling, but it grants unusually broad autonomy: subagents can modify code, push branches, open PRs, react to external GitHub content, and optionally merge to `main` without per-action confirmation. The main concern is operational risk and prompt-injection exposure from untrusted PR/CI content, not clear credential theft or malware.
This module is a local session-state capture mechanism: it indiscriminately reads complete JSON from STDIN and persists it verbatim to a predictable hidden location under `.claude/` for later automated consumption. Even though exfiltration and downstream processing are not shown in this snippet, the intended capture scope (after API responses), covert persistence, and unvalidated storage of session/context data present a high privacy/security risk and strong indicators of malicious tooling behavior within a supply-chain or agent integration.
This fragment implements a persistent hook that captures Claude session JSON from `statusLine` stdin and stores it in a project-local file (`.claude/bad-session-state.json`). It also overwrites local Claude settings to ensure the hook is invoked, and may additionally execute a pre-existing `statusLine.command` as a pipeline stage using captured session JSON. No direct network exfiltration is evidenced in the snippet, but the intentional capture/persistence of session data plus configuration hijack and dynamic command chaining makes this a high privacy/supply-chain misuse risk that warrants review and sandboxing.