blog-google
Audited by Socket on Apr 9, 2026
1 alert found:
AnomalyThis module is a local bootstrap/launcher that creates a virtual environment and then executes a Python file selected via command-line input. While there is no direct evidence of data theft or network-based malware in the fragment, the launcher lacks strict allowlisting and does not robustly prevent path traversal/absolute-path script selection before constructing the target path. This creates a plausible arbitrary-code-execution risk in threat models where argv[1] can be influenced or the filesystem contents are not fully trusted. The first-run execution of setup_environment.py is another high-impact execution step, but its safety depends entirely on that file’s contents and integrity outside this snippet.