Back to skill
Skillv1.3.7
Static analysis security
Swarm · Deterministic local checks for risky code patterns and metadata mismatches.
Scanner verdict
ReviewApr 30, 2026, 4:55 AM
- Summary
- Detected: suspicious.dangerous_exec, suspicious.env_credential_access, suspicious.potential_exfiltration (+1 more)
- Reason codes
- suspicious.dangerous_execsuspicious.env_credential_accesssuspicious.potential_exfiltrationsuspicious.prompt_injection_instructions
- Engine
- v2.4.5
Evidence
criticallib/diagnostics.js:194
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticaltest/run-all.js:22
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalbench.js:8
Environment variable access combined with network send.
suspicious.env_credential_access
criticalconfig.js:17
Environment variable access combined with network send.
suspicious.env_credential_access
criticaldocker/worker/agent.js:14
Environment variable access combined with network send.
suspicious.env_credential_access
criticallib/daemon.js:1251
Environment variable access combined with network send.
suspicious.env_credential_access
criticaltap-analysis.js:14
Environment variable access combined with network send.
suspicious.env_credential_access
warnbench.js:9
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnbin/swarm-daemon.js:22
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnbin/swarm.js:249
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnconfig.js:25
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnlib/daemon.js:1253
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warntap-analysis.js:49
File read combined with network send (possible exfiltration).
suspicious.potential_exfiltration
warnCHANGELOG.md:122
Prompt-injection style instruction pattern detected.
suspicious.prompt_injection_instructions
