dotnet-blazor-auth
Fail
Audited by Socket on Mar 7, 2026
1 alert found:
Obfuscated FileObfuscated FileSKILL.md
HIGHObfuscated FileHIGH
SKILL.md
Overall, the skill’s stated purpose (Blazor authentication/authorization UI patterns and hosting-model-specific flow guidance) is coherent with its capabilities. There are no evident malicious Install/Execute patterns, unverifiable binaries, or credential harvesting behaviors. The primary security considerations are standard best practices around token storage in browser storage and correct handling of HttpContext in interactive modes. The data flows described are appropriate for Blazor authentication and do not indicate exfiltration or misuse. While cautious about localStorage usage for tokens, the material remains within expected, legitimate boundaries for a Blazor security guide.
Confidence: 98%
Audit Metadata