grpc-integration-patterns

Warn

Audited by Socket on Mar 1, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

This skill and example code are consistent with their stated purpose: implementing gRPC services and clients in ABP microservices. There is no direct evidence of malicious intent or supply-chain download/execute behavior. However, there are several security-relevant patterns that warrant attention: (1) disabling TLS certificate validation in the HttpClient handler for development — ensure this is never enabled in production; (2) EnableDetailedErrors = true can leak internal details — restrict to dev; (3) interceptor-based tenant switching that trusts x-tenant-id header must be guarded by proper authentication/authorization to prevent tenant spoofing; (4) logging request objects can leak sensitive data and should use redaction or structured filters; (5) client-stream handling accumulates messages in memory without size limits — add quotas/validation. Overall risk is moderate from misconfiguration and operational practices, but I find no malicious code. Review deployment configs and add runtime guards and limits before production use.

Confidence: 85%Severity: 75%
Audit Metadata
Analyzed At
Mar 1, 2026, 04:34 PM
Package URL
pkg:socket/skills-sh/thapaliyabikendra%2Fai-artifacts%2Fgrpc-integration-patterns%2F@65864ae46db6362e7edbbb0a5d8a0a1fd9e8fc30