aiter-control
Fail
Audited by Socket on Mar 4, 2026
1 alert found:
MalwareMalwareSKILL.md
HIGHMalwareHIGH
SKILL.md
The skill fragment is consistent with its stated purpose of controlling AiTer via CLI, using local IPC and structured JSON payloads. It does not introduce extraneous capabilities, credential handling, or remote execution paths. The primary risk is local IPC security (unauthorized access to the Unix socket) and ensuring the local file server and inter-agent messaging are properly access-controlled. Overall, the footprint is benign and purpose-aligned, categorized as low-to-medium security risk due to IPC exposure considerations.
Confidence: 95%Severity: 90%
Audit Metadata