performing-security-code-review

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Security
SecurityMEDIUM
assets/example_code_vulnerable.py

The file is an explicit educational collection of insecure coding patterns, but it includes a concrete malicious pickle payload that would execute a destructive shell command if unpickled. While the intent appears didactic rather than stealthy supply-chain malware, the code contains high-risk sinks (unpickling untrusted data, subprocess.run with shell=True, path traversal, SQL string concatenation). Do not unpickle untrusted input, avoid shell=True with concatenated input, validate filenames, and replace these examples with safe, non-destructive demonstrations when used in shared repositories.

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Feb 27, 2026, 10:28 AM
Package URL
pkg:socket/skills-sh/aaaaqwq%2Fclaude-code-skills%2Fperforming-security-code-review%2F@ec5163bb43612d9da05f7313c56a3d4ed62b688f