jest

Fail

Audited by Socket on Feb 23, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
.claude/settings.local.json

This JSON fragment by itself is not executable malware and contains no hardcoded secrets, but it declares a highly sensitive capability: permission referencing Bash and a permissive pattern. If the consuming application maps this to actual shell execution or broad file-descriptor access, it can enable arbitrary command execution and data exfiltration. Recommend treating this as high-risk until the runtime's exact semantics are confirmed. Mitigations: tighten permission semantics (explicit command/argument/dir whitelists), avoid granting raw shell access, restrict fd/glob patterns, apply sandboxing (no network fds, seccomp, namespaces), and require explicit audit/logging when such permissions are present.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 23, 2026, 03:04 PM
Package URL
pkg:socket/skills-sh/anivar%2Fjest-skill%2Fjest%2F@5a3a32dabdd25b2ce953884147100a1f34beda56