jeo

Warn

Audited by Socket on Apr 20, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
references/PLATFORM_SETUP.md

No malicious payload is directly visible in the provided configuration/documentation snippet. The main risk is operational/supply-chain: it defines automatic, event-driven execution of local scripts from user home directories and starts an external MCP server via `npx -y` without visible version pinning/integrity controls. Review the referenced local Python/shell scripts and ensure the npm dependency used by the MCP server is pinned/locked and integrity-verified before considering this setup safe.

Confidence: 56%Severity: 58%
SecurityMEDIUM
scripts/install.sh

No explicit malicious behavior is visible in this Bash fragment (no clear exfiltration or backdoor logic). The dominant concern is supply-chain execution risk: it runs third-party code via bunx/npx and global npm installs, and it includes a fallback that directly executes a network-fetched script via curl|bash. Additionally, run() uses eval for command execution, which is an execution-risk amplifier. Overall: treat this as a high-impact installer that requires trust verification of invoked scripts/packages, version pinning, and integrity checks—otherwise it could become malware delivery machinery if any upstream component or URL is compromised.

Confidence: 66%Severity: 70%
Audit Metadata
Analyzed At
Apr 20, 2026, 04:32 AM
Package URL
pkg:socket/skills-sh/akillness%2Foh-my-skills%2Fjeo%2F@5fb30c2cd0f17e87241111684302db2d54e8121c