jeo
Audited by Socket on Apr 20, 2026
2 alerts found:
AnomalySecurityNo malicious payload is directly visible in the provided configuration/documentation snippet. The main risk is operational/supply-chain: it defines automatic, event-driven execution of local scripts from user home directories and starts an external MCP server via `npx -y` without visible version pinning/integrity controls. Review the referenced local Python/shell scripts and ensure the npm dependency used by the MCP server is pinned/locked and integrity-verified before considering this setup safe.
No explicit malicious behavior is visible in this Bash fragment (no clear exfiltration or backdoor logic). The dominant concern is supply-chain execution risk: it runs third-party code via bunx/npx and global npm installs, and it includes a fallback that directly executes a network-fetched script via curl|bash. Additionally, run() uses eval for command execution, which is an execution-risk amplifier. Overall: treat this as a high-impact installer that requires trust verification of invoked scripts/packages, version pinning, and integrity checks—otherwise it could become malware delivery machinery if any upstream component or URL is compromised.