alibabacloud-dataworks-datastudio-develop

Warn

Audited by Socket on Apr 3, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/build.py

No direct malware traits are evident in this fragment: it performs local filesystem reads, JSON parsing, placeholder substitution, and JSON serialization/output—there is no network access, eval/exec, subprocess execution, or persistence. The main supply-chain-adjacent risk is operational/integrity/confidentiality: the broad and order-dependent find_code_file() selection can cause unintended sensitive file contents to be embedded into the output spec, and args.output enables arbitrary file overwrite/write under the running user’s permissions. If directories/outputs are attacker-influenced in a build pipeline, review/lock down file selection and output paths to prevent unintended data inclusion and corruption.

Confidence: 72%Severity: 56%
AnomalyLOW
assets/templates/07-parallel-workflow/_deploy.md

No explicit malware is present in the shell orchestration itself, but the script functions as a high-impact execution vehicle: it uploads and immediately runs an online DataWorks workflow whose behavior is fully determined by unvalidated JSON files read from mutable /tmp. If those JSON artifacts are tampered with, the resulting pipeline could perform unauthorized or malicious actions in the target DataWorks environment. This should be treated as a deployment integrity/supply-chain trust issue requiring strong input integrity controls (e.g., immutable artifact storage, signatures/checksums, strict permissions, and validation) before running Online.

Confidence: 62%Severity: 62%
Audit Metadata
Analyzed At
Apr 3, 2026, 09:57 AM
Package URL
pkg:socket/skills-sh/aliyun%2Falibabacloud-aiops-skills%2Falibabacloud-dataworks-datastudio-develop%2F@ea491063eeb7fec638bab84eada977cffb5d167d