squads
Audited by Socket on Apr 26, 2026
1 alert found:
SecurityNo clear evidence of an intentionally malicious backdoor exists in this Bash fragment (no exfiltration, credential theft, or persistence behavior is visible). However, it significantly increases supply-chain and trust-boundary risk: it installs npm packages based on dependency names read from squad.yaml without visible allowlisting, pinning, or integrity verification, and it performs dynamic node -e require() checks using strings derived from that same configuration. Additionally, it copies untrusted agent definition files into a local command directory that may be interpreted later by other components. If squad.yaml/agents can be influenced by an attacker, activation can become a practical pathway to install malicious npm packages or trigger unintended behavior.