worker-handover
Audited by Socket on Feb 16, 2026
1 alert found:
Security[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] BENIGN with operational caution. This skill/instruction set correctly matches its stated purpose (creating and consuming handovers via GitHub issue comments). It does not contain obfuscated or malicious code or calls to unknown domains. The practical risk is accidental leakage of sensitive information into issue comments; operators should sanitize handovers and ensure appropriate repository permissions and policies for comment visibility. No indicators of credential harvesting or covert exfiltration were found. LLM verification: The skill implements coherent and expected behavior for worker handover via git and GitHub issue comments; there is no evidence of malware or obfuscated malicious code. However, storing 'full context' verbatim in issue comments without sanitization is a design risk: it can leak secrets, credentials, or other sensitive data. The network sinks are legitimate (GitHub) and no third-party proxying is present, but the persistence and potential visibility of issue comments make this pattern potentially