autonomous-loops
Audited by Socket on Mar 12, 2026
1 alert found:
AnomalyThe skill presents a coherent collection of loop patterns for autonomous Claude Code workflows, including sequential, REPL-based, DAG-driven RFCs, and PR-loop patterns. However, the install path using a curl|bash from a remote URL constitutes a significant supply-chain risk and should be replaced with pinned, verified installation sources or containerized execution. The autonomous execution capabilities (PR creation, CI remediation, and multi-agent orchestration) align with the stated purpose of enabling autonomous loops, but require robust governance (per-action prompts, approvals, and safeguards) to prevent unintended code changes. Overall, the footprint is suspicious to high-risk due to the download-execute pattern and autonomous real-world actions, but not clearly malicious as described; with proper mitigations (pinned install, explicit user gates, audit logging), the concept remains plausible for developer tooling. Security risk: high; malware risk: moderate; overall assessment leans toward SUSPICIOUS due to supply-chain and autonomy concerns.