reunion
Audited by Socket on Apr 6, 2026
2 alerts found:
Anomalyx2No direct evidence of intentional malware is present in this fragment (no eval/exec/subprocess/network/credential theft). However, it meaningfully increases security risk by (1) modifying sys.path at runtime (import-hijack exposure), (2) using a user-controlled name to build a JSON filename for open()/json.load without visible sanitization in this module (potential path traversal/arbitrary local file read if core does not constrain it), (3) accepting arbitrary user-selected filesystem paths for parsing via DataParser without visible validation/sandboxing here, and (4) printing potentially sensitive stored/persona content directly to the console. Real malware/exfiltration would require inspection of the delegated core modules (DataParser/ReunionManager/engine), but the attack surface in this CLI is non-trivial.
SUSPICIOUS: no network exfiltration or external installer is present, but the skill converts untrusted personal content into newly installed callable skills under ~/.claude/skills. That transitive installation plus prompt-injection exposure and explicit AI-identity concealment make the footprint riskier than a normal local memorial-writing workflow.