expect
Warn
Audited by Socket on Apr 15, 2026
1 alert found:
AnomalyAnomalyreferences/ci-integration.md
LOWAnomalyLOW
references/ci-integration.md
No direct malicious payload is evident in this CI/workflow/hook snippet alone. However, it materially increases supply-chain/behavioral risk by (1) installing and running Claude Code and the ork plugin at workflow time from unpinned sources (floating @latest / unpinned plugin), and (2) executing an agent-style workflow automatically with a live ANTHROPIC_API_KEY in CI and on developer pre-push. Additionally, failure-path artifact upload of screenshots/recordings can unintentionally expose sensitive UI content. Pin versions, verify plugin/tool provenance, limit API key scope/permissions, and review what the agent captures and writes to .expect/.
Confidence: 62%Severity: 66%
Audit Metadata