Back to skill
Skillv1.0.0

Static analysis security

Aagent System · Deterministic local checks for risky code patterns and metadata mismatches.

Scanner verdict

ReviewApr 30, 2026, 5:15 AM
Summary
Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution, suspicious.env_credential_access (+1 more)
Reason codes
suspicious.dangerous_execsuspicious.dynamic_code_executionsuspicious.env_credential_accesssuspicious.potential_exfiltration
Engine
v2.4.5

Evidence

criticalagents/analyzer/agent.cjs:9
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalagents/collector/agent.cjs:110
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalagents/evolver/agent.cjs:162
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalagents/orchestrator/agent.cjs:42
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalagents/researcher/agent.cjs:9
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalagents/scanner/agent.cjs:10
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalbin/agent-manager.cjs:38
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalagents/designer/agent.cjs:61
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalagents/collector/agent.cjs:3
Environment variable access combined with network send.
suspicious.env_credential_access
criticalagents/ultra-collector/agent.cjs:8
Environment variable access combined with network send.
suspicious.env_credential_access
warnagents/collector/agent.cjs:62
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnagents/ultra-collector/agent.cjs:49
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration