GrayMatter

Security checks across static analysis, malware telemetry, and agentic risk

Overview

No artifact-backed suspicious behavior could be identified from the supplied telemetry, and the workspace artifacts could not be read in this run.

This result is low confidence because the workspace artifacts could not be inspected. Re-run the review with readable metadata.json and artifact contents before relying on the verdict.

Static analysis

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Dangerous exec

Critical
Finding
Shell command execution detected (child_process).

Env credential access

Critical
Finding
Environment variable access combined with network send.

Exposed secret literal

Critical
Finding
File appears to expose a hardcoded API secret or token.

Exposed secret literal

Critical
Finding
File appears to expose a hardcoded API secret or token.

VirusTotal

63/63 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.