product-changelog
Audited by Socket on Mar 4, 2026
1 alert found:
MalwareThis skill/instruction document is primarily benign and focused on changelog writing and generating visuals via the inference.sh CLI. However, it contains multiple supply-chain and data-flow patterns that elevate security risk: a curl|sh install flow, downloads from dist.inference.sh, implicit credential usage via `infsh login`, sending user inputs and local screenshots to third-party apps run through the infsh service, and examples encouraging transitive installs via npx. These behaviors are proportionate to the stated functionality (remote model/app execution and CLI installs) but require caution: the download-execute pattern and transitive installs are high-risk supply-chain vectors, and the documentation lacks detail about how credentials and uploaded files are protected. Recommend avoiding piping remote scripts to shell, verifying checksums out-of-band, being cautious not to upload secrets or sensitive URLs to remote app runs, and auditing any transitive skills before installing.