bad

Fail

Audited by Socket on Apr 21, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill is largely purpose-aligned for autonomous development and uses official tooling, but it grants unusually broad autonomy: subagents can modify code, push branches, open PRs, react to external GitHub content, and optionally merge to `main` without per-action confirmation. The main concern is operational risk and prompt-injection exposure from untrusted PR/CI content, not clear credential theft or malware.

Confidence: 90%Severity: 79%
MalwareHIGH
assets/bad-statusline.sh

This module is a local session-state capture mechanism: it indiscriminately reads complete JSON from STDIN and persists it verbatim to a predictable hidden location under `.claude/` for later automated consumption. Even though exfiltration and downstream processing are not shown in this snippet, the intended capture scope (after API responses), covert persistence, and unvalidated storage of session/context data present a high privacy/security risk and strong indicators of malicious tooling behavior within a supply-chain or agent integration.

Confidence: 74%Severity: 85%
MalwareHIGH
references/coordinator/setup-statusline-hook.md

This fragment implements a persistent hook that captures Claude session JSON from `statusLine` stdin and stores it in a project-local file (`.claude/bad-session-state.json`). It also overwrites local Claude settings to ensure the hook is invoked, and may additionally execute a pre-existing `statusLine.command` as a pipeline stage using captured session JSON. No direct network exfiltration is evidenced in the snippet, but the intentional capture/persistence of session data plus configuration hijack and dynamic command chaining makes this a high privacy/supply-chain misuse risk that warrants review and sandboxing.

Confidence: 66%Severity: 72%
Audit Metadata
Analyzed At
Apr 21, 2026, 10:08 PM
Package URL
pkg:socket/skills-sh/stephenleo%2Fbmad-autonomous-development%2Fbad%2F@62943338e019b9489c16dc35f330bcd8ca4bbff3