processes
Audited by Socket on Feb 20, 2026
2 alerts found:
AnomalyObfuscated FileThe code intentionally exposes powerful process-control capabilities: arbitrary command execution (proc.execute) and killing arbitrary PIDs (proc.killTree), plus return of command outputs and process metadata. The fragment itself is not obfuscated and does not contain hidden network calls or hardcoded secrets, but it is high-risk if accessible by untrusted callers because it enables remote command execution, process termination, and information disclosure. Recommend enforcing strict authorization checks, input restrictions/sanitization, sandboxing, and careful review of the imported '../../../process/index' implementation before using in any environment reachable by untrusted users.
The reviewed fragment documents a powerful process manager that legitimately provides spawn/monitor/stop/restart and logging functionality. There is no direct evidence of obfuscated or malicious code in the provided text. However, the ability to run arbitrary commands, pass full environment variables into children, and write logs/DB to configurable paths creates significant security risk if the API is exposed to untrusted agents or users. Recommend treating this module as high-privilege: restrict access to trusted operators only, implement command/argument allowlists, sanitize and minimize environment passed to children, sandbox processes (containers, cgroups, seccomp), enforce strict filesystem path controls, and audit logs for sensitive data. Without those mitigations the package poses a moderate-to-high operational risk.