seo-image-gen

Warn

Audited by Socket on Apr 7, 2026

1 alert found:

Anomaly
AnomalyLOW
references/seo-image-presets.md

This fragment is not malicious code itself; it is preset configuration/documentation. The main security concern is that presets include ImageMagick `post_processing` strings (including shell-like chaining with `&&`). If the consuming application executes these `post_processing` strings via a shell or without strict allowlisting/sanitization—especially when loading user-created presets from `~/.banana/presets/`—it can become a command-execution / command-injection vector. Review the downstream preset loader/executor to confirm it does not interpret `post_processing` as a shell command string and that it validates/allowlists operations and paths.

Confidence: 62%Severity: 60%
Audit Metadata
Analyzed At
Apr 7, 2026, 01:41 AM
Package URL
pkg:socket/skills-sh/AgriciDaniel%2Fclaude-seo%2Fseo-image-gen%2F@b25d18bfe2c47c6f83448df7d45f3916e1720ce9