dogfooding
Audited by Socket on Mar 1, 2026
2 alerts found:
Obfuscated FileAnomalyThe integrated assessment identifies the tool as a benign data-aggregation utility intended to summarize dogfooding results. The primary issues for reliability and security are an evident truncation bug at the end of the script and a weak fallback path when jq is unavailable. The recommended improvements focus on fixing the end-of-file bug, strengthening input validation, replacing or hardening the fallback payload to avoid misleading metrics, and adding schema validation for input JSON to prevent malformed data from contaminating aggregates. With these fixes, the script can serve as a safe, auditable component in a software supply-chain security workflow.
This 'dogfooding' skill is conceptually benign and its capabilities align with the stated purpose of validating and testing a skills repository. However, it orchestrates installation and execution of many other skills via npx and shell scripts and is intended to run continuously (cron). Because it performs download-and-execute operations and creates transitive trust chains without documented safeguards (pinning, integrity checks, sandboxing, credential scoping), it presents a moderate supply-chain risk. There are no direct signs of malware or credential harvesting in the provided document, but operational deployment should be constrained: pin/verify dependencies, run in isolated environments (CI containers with least privilege), require manual approval for installing/updating third-party skills, and limit what environment secrets are exposed to invoked skills.