forge
Audited by Socket on Apr 9, 2026
3 alerts found:
Securityx3No clear evidence of intentional malware (no reverse shells, no obvious data exfiltration to external domains, no cryptomining). However, the runner includes strong arbitrary code execution primitives driven by external inputs: page.evaluate() uses spec-provided code strings (step.expression/assertion.script), and the runner can dynamically import and execute a user-specified run script module. Additionally, screenshot/output paths are partly influenced by spec-derived names and env/CLI args, which could enable path traversal outside the intended directory if untrusted specs are used. Treat this as high-risk for supply-chain/control-plane abuse unless all specs/scripts are fully trusted and paths are sanitized.
SUSPICIOUS。该技能表面上是本地交付编排器,Git 与状态文件操作基本符合目的;但其实际核心依赖多个来源未验证的 forge-* 子 Skill,并通过 Agent 进行跨技能调用,带来明显的传递信任风险。未见直接窃密、外部下载器或明确恶意外传,因此不构成确认恶意;主要问题是未验证子技能链条叠加自动化发布能力。
SUSPICIOUS: 目的本身是复盘与知识沉淀,读取项目与 git 历史基本相符;但该技能的实际脚印过大,包含自动 web research、跨会话 Memory 修改、WORKSPACE-PULSE 更新、未验证本地脚本执行,以及最关键的自动 git pull/rebase/commit/push。对一个总结类技能而言,这些真实世界与远程仓库变更能力不够克制,尤其在处理外部搜索内容时存在间接提示注入与错误回写风险。未见明确凭证窃取或恶意外传,因此更符合高风险可疑技能而非确认恶意。