tailscale-policy-manager
Audited by Socket on Mar 11, 2026
2 alerts found:
Obfuscated Filex2The manifest itself is not an explicit malware payload, but it grants a combination of powerful capabilities (network fetches, arbitrary shell execution, local file inspection) that enable remote code execution and data exfiltration if misused or if the agent enacting these permissions is compromised. The primary risk vector is the broad, wildcarded Bash entries (curl, python, python3, open, lsof) which can bypass domain-restricted WebFetch and be composed to read sensitive data and transmit it off-host. Recommend tightening the policy: remove or narrow Bash(...) wildcards, restrict curl/python invocations to approved domains or disallow them, require cryptographic verification (signatures/hashes) for fetched code, and remove access to lsof/open unless strictly necessary and audited.
The skill appears to be a documentation-grounded guide for managing Tailscale policy files with GitOps and API validation. Its footprint is coherent with the stated purpose and does not show immediate red flags such as unverifiable binaries, credential exfiltration, or hidden data flows. Security risk is moderate and hinges on secure CI/CD secret management and correct API permissions; ensure that authentication methods (API keys, OIDC) are restricted, rotated, and scoped to necessary endpoints. No evidence of autonomous real-world actions or credential forwarding patterns is present in the provided content.