popebot-doctor
Audited by Socket on Mar 1, 2026
2 alerts found:
SecurityAnomalyThis SKILL.md documents a legitimate-looking diagnostic and repair skill for PopeBot environments. The described capabilities (diagnose, verify, report, repair, monitor) are coherent with the stated purpose. However, the repair and token-validation features create meaningful supply-chain and credential-risk vectors: the skill will likely read environment variables, local authentication state, and files, and it can write/modify system state and install packages or other skills. Those behaviors are proportionate only if implemented with strict safeguards (redaction of secrets in reports, explicit user approvals for repairs and installs, pinned dependencies, and transparent network endpoints). Because the documentation does not state safe handling practices, does not include a lockfile, and demonstrates programmatic installation of other skills (transitive installs), I assess moderate security risk. I do not see explicit malicious code or obfuscation in the provided documentation, but the capability footprint (credential access + network + auto-repair + transitive installs) warrants careful review of the actual implementation before trust.
The code performs privileged filesystem and process actions based directly on fields from results.items (item.check and item.remediation) without sanitization. This enables potential supply-chain or local abuse: an attacker who can influence the findings structure could cause npm installs (which execute lifecycle scripts and perform network fetches), create directories, and change permissions anywhere the process can access. The code is not obfuscated and appears intended for legitimate automated remediation, but it lacks input validation and confinement, making it a moderate security risk if untrusted data can reach it.