kata-verify-work
Warn
Audited by Socket on Apr 10, 2026
1 alert found:
SecuritySecurityreferences/verify-work.md
MEDIUMSecurityMEDIUM
references/verify-work.md
No direct evidence of overt malware (e.g., data theft/exfiltration/backdoors) is present in this fragment. The primary supply-chain security concern is high-impact arbitrary command execution in the extra verification step: configuration-provided command strings are executed via `source` and `eval` on the host. If an attacker can influence extra_verification_commands or the template/config resolution path, this workflow can be turned into a general-purpose execution primitive. Secondary concerns include prompt injection effects via inlined templates and user text flowing into downstream automated planning/execution artifacts.
Confidence: 62%Severity: 78%
Audit Metadata