product-documentation
Audited by Socket on Feb 23, 2026
1 alert found:
Security[Skill Scanner] [Documentation context] Installation of third-party script detected This skill is a documentation modernization / standards-enforcement skill that reads and updates local product documentation and templates. Its actions are consistent with its stated purpose: reading repo markdown files, suggesting or making edits, and writing templates (pyproject.toml, success-metrics, etc.). I found no evidence of malicious behavior, remote code download/execute, credential harvesting, or obfuscated payloads. The primary risk is operational: the skill assumes the agent has read/write access to the repository and enforces strict tooling/policy choices (UV and Plotly). Recommend normal operational caution (run in a trusted repo, review suggested edits before applying). LLM verification: [LLM Escalated] The skill is a documentation/templates instrument meant to modernize product docs and enforce workspace-hub standards. It contains legitimate supply-chain risk signals: unpinned and explicit install commands, and instructions to read local agent instruction directories that may contain sensitive content. There is no evidence of obfuscated or malicious code, credential harvesting, or exfiltration endpoints. Treat the shell/install examples as human-reviewed actions only, add dependency pinning an