kata-verify-work

Warn

Audited by Socket on Apr 10, 2026

1 alert found:

Security
SecurityMEDIUM
references/verify-work.md

No direct evidence of overt malware (e.g., data theft/exfiltration/backdoors) is present in this fragment. The primary supply-chain security concern is high-impact arbitrary command execution in the extra verification step: configuration-provided command strings are executed via `source` and `eval` on the host. If an attacker can influence extra_verification_commands or the template/config resolution path, this workflow can be turned into a general-purpose execution primitive. Secondary concerns include prompt injection effects via inlined templates and user text flowing into downstream automated planning/execution artifacts.

Confidence: 62%Severity: 78%
Audit Metadata
Analyzed At
Apr 10, 2026, 12:02 PM
Package URL
pkg:socket/skills-sh/gannonh%2Fkata-orchestrator%2Fkata-verify-work%2F@54628c810c78722f2cb1005ff10e710e0ac629f7