gstack

Warn

Audited by Socket on Mar 29, 2026

8 alerts found:

Anomalyx4Securityx4
AnomalyLOW
setup-browser-cookies/SKILL.md

SUSPICIOUS. The stated purpose and core capability align: importing local browser cookies into a headless QA session is coherent. The main risk comes from opaque local `gstack`/`browse` binaries and an unspecified `./setup` path handling decrypted session cookies, plus an unpinned official `curl|bash` Bun install. I do not see clear evidence of deliberate exfiltration or malicious intent, but the trust chain is insufficiently transparent for a benign classification.

Confidence: 81%Severity: 66%
AnomalyLOW
qa/SKILL.md

SUSPICIOUS: the skill is broadly aligned with QA and bug-fixing, but its footprint is expansive. The main concerns are autonomous repo modification/commits, browsing untrusted web content while retaining Bash/write access, credential/cookie handling through a local browse binary, and supply-chain risk from curl|bash plus local skill chaining. No strong evidence of deliberate credential theft or exfiltration was found.

Confidence: 84%Severity: 61%
AnomalyLOW
qa-only/SKILL.md

Mostly coherent QA skill with normal browser-testing, screenshot, and report-writing behavior. Main concerns are the local gstack helper/upgrade trust chain, optional Bun pipe-to-shell install, and prompt-injection exposure from browsing untrusted web content with Bash/Write permissions; these make it suspicious-but-not-malicious rather than clearly benign.

Confidence: 83%Severity: 57%
AnomalyLOW
plan-design-review/SKILL.md

SUSPICIOUS. The core review/edit behavior is legitimate, but the skill's footprint is broader than its stated purpose: it invokes opaque local gstack binaries, can hand off to another skill for upgrades, and writes persistent session/review/contributor state. No strong evidence of credential theft or malicious exfiltration appears, but the trust and scope boundaries are looser than a narrowly scoped design-review skill should need.

Confidence: 81%Severity: 58%
SecurityMEDIUM
review/SKILL.md

SUSPICIOUS: the stated purpose is coherent for a PR review skill, and most git/GitHub/file actions are proportionate. The main issue is trust: it relies on unverifiable local `gstack` executables and can route into another skill's upgrade flow, which raises supply-chain and transitive-trust risk above a normal review guide.

Confidence: 84%Severity: 80%
SecurityMEDIUM
design-review/SKILL.md

SUSPICIOUS. The core design-audit behavior is plausible, but the skill's footprint is broad and it relies on opaque local gstack/browse executables plus optional pipe-to-shell installation. I found no clear credential theft or exfiltration, so this looks more like a high-risk, overpowered workflow skill than confirmed malware.

Confidence: 86%Severity: 78%
SecurityMEDIUM
plan-ceo-review/SKILL.md

SUSPICIOUS. The skill's review-oriented purpose broadly matches its repo-reading behavior, but its dependency on opaque local gstack binaries and built-in upgrade flow creates a disproportionate trust footprint for a planning skill. I do not see clear malicious exfiltration, but the unverifiable helper binaries materially raise security risk.

Confidence: 83%Severity: 78%
SecurityMEDIUM
document-release/SKILL.md

SUSPICIOUS. The core capability is coherent for a documentation-update skill, and the Git/GitHub data flows are proportionate. However, the preamble runs unverifiable local gstack executables and may chain into another local skill for upgrades, creating a notable install-trust and transitive-trust risk that is larger than the documented purpose alone. No clear credential harvesting or malicious exfiltration is shown.

Confidence: 84%Severity: 72%
Audit Metadata
Analyzed At
Mar 29, 2026, 03:33 AM
Package URL
pkg:socket/skills-sh/iancleary%2Fdotfiles%2Fgstack%2F@eff617ae20ee3440fa47a066dde35f924ffc4f4f