claude-code-proxy-patterns
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The reference file
references/launchd-configuration.mdcontains a hardcoded API key (sk-cp-49GSmHBfC0c65pvYrFoZZy8xEjOVxXrUiTIJn65ynTvgzoiGEvM7q9V5dYYe6PwjMfZaGelKoE2oTq1hKnttv8ODm36O8gklUIi1eaTVOKbPILlIPfNcM0E) within the launchd plist configuration template. - [DATA_EXFILTRATION]: The skill provides logic to programmatically extract sensitive OAuth credentials from the macOS Keychain using the
securitycommand-line utility. This is documented inSKILL.md(Working Pattern WP-01) and detailed inreferences/oauth-internals.md. - [COMMAND_EXECUTION]: The skill instructs the user to use
sudoto perform system-level operations, including copying files to restricted directories (/Library/LaunchDaemons/) and loading services vialaunchctl. It establishes a persistence mechanism through a launchd daemon configured withRunAtLoadandKeepAlive, ensuring the proxy runs automatically and restarts on failure.
Recommendations
- AI detected serious security threats
Audit Metadata