telegram-channel-parser
Audited by Socket on Apr 1, 2026
1 alert found:
AnomalyThis module is primarily a Telegram scraping/parsing utility with local caching. In the provided fragment, there is no clear evidence of overt malware (no network exfiltration to attacker domains, no credential theft, no backdoor logic). However, it contains meaningful supply-chain/execution risks: it sources a local .env file directly (runtime command execution if tampered) and uses eval to dereference an environment-derived variable name (code-injection primitive). Additionally, cached path construction relies on minimally sanitized channel strings, and outbound requests are driven by user-influenced URL components. These issues warrant hardening (avoid '.' sourcing for untrusted config, remove eval, validate/sanitize channel/path inputs, and constrain curl target components).