orchestrate
Audited by Socket on May 12, 2026
3 alerts found:
Anomalyx2SecuritySUSPICIOUS: the skill's workflow orchestration behavior mostly matches its stated purpose, but it has a broad operational footprint (Bash, task orchestration, git commits) and explicitly participates in transitive skill installation through `npx skills add`. The main concern is not obvious malware, but elevated trust and execution risk from installing/using additional third-party skills and granting the orchestrator broad repo control.
No explicit malware is present in the provided snippet (it contains configuration and documentation only). However, it defines a hook-based system that executes arbitrary shell commands from a user-writable hooks directory and persists extensive event/task/tool activity into local JSONL logs. If hook scripts or the hook configuration are compromised, this architecture could enable persistence, data theft, or other impact; additionally, verbose logging increases the chance of sensitive data exposure at rest unless redaction/retention controls are implemented in the unseen hook/logging scripts. Review the referenced hook scripts and the workflow-init/message-queue implementations for command safety, redaction, and integrity protections.