setup-workflow
Audited by Socket on May 12, 2026
2 alerts found:
SecurityAnomalyNo explicit malware is present in the provided snippet (it contains configuration and documentation only). However, it defines a hook-based system that executes arbitrary shell commands from a user-writable hooks directory and persists extensive event/task/tool activity into local JSONL logs. If hook scripts or the hook configuration are compromised, this architecture could enable persistence, data theft, or other impact; additionally, verbose logging increases the chance of sensitive data exposure at rest unless redaction/retention controls are implemented in the unseen hook/logging scripts. Review the referenced hook scripts and the workflow-init/message-queue implementations for command safety, redaction, and integrity protections.