personal-context-reinit
Audited by Socket on Mar 2, 2026
1 alert found:
MalwareThe skill/documented workflow is coherently aligned with a legitimate purpose of resetting personal-context data and guiding reconfiguration. It involves credential handling via macOS Keychain and an external GitHub-based installation, which introduces supply-chain risk but is not, by itself, malicious. The destructive data-wipe behavior (overwriting profile.enc) is consistent with a reset workflow but warrants explicit user confirmation (which is described). The macOS-specific, beta-referenced, and external-install aspects raise suspicious-but-not-malicious concerns, suggesting a cautious stance but not a definitive threat. Overall, the footprint is Benign with Moderate security risk due to external install sources, credential exposure in environment variables, and platform dependencies.