file-deletion-rules

Fail

Audited by Socket on Feb 19, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] Benign: The fragment constitutes a coherent, self-contained deletion policy for git-based projects. It does not introduce external dependencies, credential requirements, or questionable data flows. The rules are consistent with the claimed purpose of ensuring preservation of deleted content via git stash and prohibiting direct deletion commands. LLM verification: Not malware. The file is an operational policy that enforces stashing before deleting files and forbids direct rm/unlink. The primary security concern is operational: mandatory, unconfirmed automatic deletions and freeform stash messages that persist in git metadata increase the risk of accidental data loss and leaking sensitive information into repository history. Recommendations: require explicit user confirmation before destructive actions (or at minimum a 'dry-run' mode), validate stash succ

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 19, 2026, 08:07 AM
Package URL
pkg:socket/skills-sh/totto2727-dotfiles%2Fagents%2Ffile-deletion-rules%2F@e95933efe74881f9ca9e9b500bef0bd63aae76f8