alibabacloud-dataworks-datastudio-develop
Audited by Socket on Apr 3, 2026
2 alerts found:
Anomalyx2No direct malware traits are evident in this fragment: it performs local filesystem reads, JSON parsing, placeholder substitution, and JSON serialization/output—there is no network access, eval/exec, subprocess execution, or persistence. The main supply-chain-adjacent risk is operational/integrity/confidentiality: the broad and order-dependent find_code_file() selection can cause unintended sensitive file contents to be embedded into the output spec, and args.output enables arbitrary file overwrite/write under the running user’s permissions. If directories/outputs are attacker-influenced in a build pipeline, review/lock down file selection and output paths to prevent unintended data inclusion and corruption.
No explicit malware is present in the shell orchestration itself, but the script functions as a high-impact execution vehicle: it uploads and immediately runs an online DataWorks workflow whose behavior is fully determined by unvalidated JSON files read from mutable /tmp. If those JSON artifacts are tampered with, the resulting pipeline could perform unauthorized or malicious actions in the target DataWorks environment. This should be treated as a deployment integrity/supply-chain trust issue requiring strong input integrity controls (e.g., immutable artifact storage, signatures/checksums, strict permissions, and validation) before running Online.