jest
Audited by Socket on Feb 23, 2026
1 alert found:
Obfuscated FileThis JSON fragment by itself is not executable malware and contains no hardcoded secrets, but it declares a highly sensitive capability: permission referencing Bash and a permissive pattern. If the consuming application maps this to actual shell execution or broad file-descriptor access, it can enable arbitrary command execution and data exfiltration. Recommend treating this as high-risk until the runtime's exact semantics are confirmed. Mitigations: tighten permission semantics (explicit command/argument/dir whitelists), avoid granting raw shell access, restrict fd/glob patterns, apply sandboxing (no network fds, seccomp, namespaces), and require explicit audit/logging when such permissions are present.