Linux Production Shell Scripts
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Instruction directing agent to run/execute external content (CI011) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] The code fragment represents a broad, coherent collection of Bash script templates for Linux system administration. It aligns with the stated purpose of providing production-ready templates, and uses standard, trusted tooling. Some elements—such as hardcoded credential placeholders, interactive password prompts within automated flows, and remote-script execution patterns—introduce security considerations that require proper hardening (least privilege, secrets handling, input validation, and secure remote management). Overall, the footprint is coherent with its purpose but requires careful configuration to avoid security risks; the presence of remote execution and credential placeholders tips the balance toward cautious use rather than outright benign certainty. LLM verification: This skill is a collection of legitimate shell script templates aligned with its stated purpose (production shell scripts for backups, monitoring, user management, and encryption). I found insecure practices and dangerous defaults (hardcoded DB password, mysqldump using -p"$db_pass" exposing credentials in process lists, unguarded rm -r in rotation, lack of secure handling for rsync destinations and encryption passphrases). These are security risks if used as-is, but there is no clear evidence o