multi-agent-e2e-validation

Fail

Audited by Socket on Feb 28, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

This SKILL document describes a legitimate multi-agent E2E validation process for database refactors. It requires executing local test scripts, provisioning containerized databases, reading local config/.env files for connectivity, and installing Python dependencies to run tests. I found no indicators of intentional malicious behavior, hidden exfiltration endpoints, obfuscated payloads, or credential forwarding to external attackers. The primary security considerations are supply-chain and execution risk from installing and running third-party dependencies and from executing unreviewed test scripts: ensure tests and dependencies are vetted, use isolated test environments with non-production credentials, pin dependency versions, and review any automated commit steps. Overall, functionally coherent with stated purpose; moderate procedural supply-chain risk but no clear malicious intent.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 28, 2026, 03:59 AM
Package URL
pkg:socket/skills-sh/terrylica%2Fcc-skills%2Fmulti-agent-e2e-validation%2F@3003a8c01a4d2b2aeb431cdc2e2e8d0ecb2aabf7