remote-cluster-agent

Warn

Audited by Socket on Apr 11, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
mcp-server/setup.sh

No direct malicious indicators (no obfuscated payloads, secrets, exfiltration, or backdoor behavior) are present in this Bash fragment. However, it performs a supply-chain-sensitive editable install into a persistent venv and forwards attacker-controlled SSH command text and user-controlled paths into the registered MCP server via environment variables. The security of the system hinges on how mcp_remote_server.py interprets and executes NODES/agent/path values; without validation, this could enable command injection or remote execution. Overall: low-to-moderate malware likelihood in this specific fragment, with moderate security risk due to delegation of untrusted inputs to a long-running server.

Confidence: 62%Severity: 50%
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill’s capabilities broadly match its stated remote-cluster purpose, but its footprint is high-trust and high-impact: it runs unverified local setup scripts, installs a custom MCP server, auto-deploys and executes a remote agent, edits SSH config, and enables arbitrary remote command execution and file transfer. Data flow stays on SSH to configured hosts rather than obvious third-party exfiltration, so this is not confirmed malware, but the custom execution chain and weakened SSH trust settings make it a materially risky infrastructure skill.

Confidence: 84%Severity: 72%
Audit Metadata
Analyzed At
Apr 11, 2026, 07:29 AM
Package URL
pkg:socket/skills-sh/jiahao-shao1%2Fsjh-skills%2Fremote-cluster-agent%2F@f74b9243a78dea45bfa7bc367349f1c35ab6cd66