pua

Warn

Audited by Socket on May 5, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
references/platform.md

The fragment outlines a feature-rich, remote-enabled CLI platform with registration, token-based API access, remote prompt delivery, payments, and telemetry. While not containing executable code, the described flows present meaningful security risk vectors if implemented insecurely: token storage on disk, reliance on remote prompts for execution, payment verification integrity, and silent telemetry. The design would benefit from strong client-side protections (encrypted token storage, least-privilege file permissions, input validation), server-side controls (verifiable remote prompts, strict TLS/config verification, robust payment validation), sandboxing of remote prompts, and explicit consent/privacy controls for telemetry. Overall, moderate risk with actionable hardening steps; no evidence of malware or obfuscation in the fragment itself.

Confidence: 61%Severity: 65%
AnomalyLOW
SKILL.md

SUSPICIOUS: the skill's core 'PUA coaching' behavior is mostly aligned with its stated purpose, but its footprint is broader than a simple style layer. Third-party install trust, persistent local state, optional telemetry upload to a non-official endpoint, and propagation into sub-agents materially increase risk. This looks more like an aggressive workflow-control skill with medium security concerns than confirmed malware.

Confidence: 84%Severity: 64%
Audit Metadata
Analyzed At
May 5, 2026, 03:30 PM
Package URL
pkg:socket/skills-sh/ninehills%2Fskills%2Fpua%2F@713ab2ce772e817793e9fd3dc54fc0f9906530a6