phase-contract-workflow

Warn

Audited by Socket on May 11, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/planctl.rb

No explicit malware/backdoor behavior (e.g., hidden networking or credential theft) is evident in this Ruby module. However, it contains a high-impact supply-chain execution gadget: it runs arbitrary shell commands taken from YAML-defined phase checks via `Open3.popen2e('sh','-lc', command, ...)` and can then write ledgers and (optionally) commit/push changes via git. Use of this tool is therefore only safe when plan/manifest.yaml (and the phase check command definitions) are fully trusted and protected; otherwise an attacker can achieve arbitrary code execution with significant persistence/blast radius.

Confidence: 74%Severity: 80%
Audit Metadata
Analyzed At
May 11, 2026, 09:32 PM
Package URL
pkg:socket/skills-sh/nanzhipro%2Fphase-contract-workflow-skill%2Fphase-contract-workflow%2F@83c50e6ea397a29d769934e2096eafd18451a3d8