pagerduty-api

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
references/schemas/Automation/AutomationActionsScriptActionDataReference.md

The schema itself is not malware, but it documents a capability that—if reachable by untrusted actors—gives direct arbitrary code execution on CI/Runner hosts. That capability makes overall usage high risk unless accompanied by strong safeguards: access controls, sandboxing/isolation, secrets scoping, egress/network controls, and explicit handling of input size/truncation. Operational guidance: only allow trusted principals to provide `script`/`invocation_command`; run executed scripts in minimal-privilege ephemeral sandboxes; restrict access to secrets and network; and audit/monitor execution.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:32 PM
Package URL
pkg:socket/skills-sh/yuyz0112%2Fstripe-api-skills%2Fpagerduty-api%2F@3d3a883a10f5253be5771bfce6924c8ad0d5e80e