seo-image-gen
Warn
Audited by Socket on Apr 7, 2026
1 alert found:
AnomalyAnomalyreferences/seo-image-presets.md
LOWAnomalyLOW
references/seo-image-presets.md
This fragment is not malicious code itself; it is preset configuration/documentation. The main security concern is that presets include ImageMagick `post_processing` strings (including shell-like chaining with `&&`). If the consuming application executes these `post_processing` strings via a shell or without strict allowlisting/sanitization—especially when loading user-created presets from `~/.banana/presets/`—it can become a command-execution / command-injection vector. Review the downstream preset loader/executor to confirm it does not interpret `post_processing` as a shell command string and that it validates/allowlists operations and paths.
Confidence: 62%Severity: 60%
Audit Metadata