by-harness
Audited by Socket on May 9, 2026
2 alerts found:
Anomalyx2No explicit malware behavior (e.g., network exfiltration, credential access, or reverse shells) is visible in this configuration snippet. However, it establishes an auto-execution pathway for repository-local Python code from a hidden `.codex/hooks/` directory, using dynamically resolved repo paths. This is a meaningful supply-chain/local-tampering risk: if the `.codex/hooks/*.py` contents are altered or malicious, they will run automatically during tool events. Review and integrity-check the referenced Python hook scripts and ensure the `.codex/hooks/` directory is not writable by untrusted parties.
SUSPICIOUS。技能目的与主要能力总体一致,集中在本地仓库脚手架、任务管理和流程约束,没有明显凭证窃取或无关数据外传迹象;但其高度依赖未公开验证来源的本地脚本,并允许通过未限定官方来源的 manifest_url 进行远程升级检查,执行面和供应链信任边界偏宽,需谨慎使用。