docmost

Fail

Audited by Socket on Mar 18, 2026

2 alerts found:

MalwareAnomaly
MalwareHIGH
.claude/settings.local.json

This manifest entry is high-risk and likely malicious in intent: it grants an automated ability to add a git remote and push local repository contents to an external GitHub repository. If honored by tooling in CI or developer environments with available credentials, it enables immediate exfiltration of source code, history, and potentially embedded secrets. Treat as potentially malicious, block execution, remove the permission, audit environments for execution attempts, and investigate the target repository and any exposed credentials.

Confidence: 80%Severity: 90%
AnomalyLOW
SKILL.md

SUSPICIOUS: the skill’s capabilities broadly match Docmost administration, but its trust model is weaker than ideal. Main concerns are transitive skill installation, GitHub-based CLI installation from a mutable source, auto-install/retry behavior, and forwarding Docmost credentials to that CLI. Data flows are otherwise proportionate to the stated purpose, so this looks more like a medium-risk agent integration than confirmed malicious content.

Confidence: 84%Severity: 64%
Audit Metadata
Analyzed At
Mar 18, 2026, 10:16 PM
Package URL
pkg:socket/skills-sh/dapi%2Fdocmost-cli%2Fdocmost%2F@90078e8c9deed56c20fca7a892a6aedf3c09b7a1