telegram-channel-parser

Warn

Audited by Socket on Apr 1, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/common.sh

This module is primarily a Telegram scraping/parsing utility with local caching. In the provided fragment, there is no clear evidence of overt malware (no network exfiltration to attacker domains, no credential theft, no backdoor logic). However, it contains meaningful supply-chain/execution risks: it sources a local .env file directly (runtime command execution if tampered) and uses eval to dereference an environment-derived variable name (code-injection primitive). Additionally, cached path construction relies on minimally sanitized channel strings, and outbound requests are driven by user-influenced URL components. These issues warrant hardening (avoid '.' sourcing for untrusted config, remove eval, validate/sanitize channel/path inputs, and constrain curl target components).

Confidence: 66%Severity: 62%
Audit Metadata
Analyzed At
Apr 1, 2026, 05:39 AM
Package URL
pkg:socket/skills-sh/artwist-polyakov%2Fpolyakov-claude-skills%2Ftelegram-channel-parser%2F@62b1c2af7d5a6ecf657e923b1f239d274b43895f