pkgmgr-homebrew-formula-dev

Warn

Audited by Socket on Mar 29, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
reference/templates/formulas/elixir.rb

This Formula itself is a standard build-and-install wrapper and contains no explicit malicious primitives (no obfuscated logic, credential theft, exfiltration, or destructive actions). However, it delegates trust to remote code in a GitHub tarball and executes `mix deps.get`/`mix escript.build`, so any compromised upstream source or dependencies can directly affect the resulting binary. The checksum metadata is a major red flag: the provided sha256 matches the SHA-256 of an empty string, suggesting placeholder/incorrect integrity verification. Additionally, the snippet appears truncated, reducing assurance that no extra logic exists. Overall: primarily a supply-chain integrity and build-time execution risk rather than confirmed malware in the wrapper itself.

Confidence: 62%Severity: 66%
SecurityMEDIUM
reference/templates/formulas/java.rb

No overt malicious Ruby logic is visible in this formula fragment, but it performs a high-impact supply-chain operation: it fetches an external source archive, executes a Maven build on that untrusted code, installs the resulting runnable JAR, and provides an executable wrapper. The declared `sha256` is an empty-string hash, which is a strong integrity red flag and warrants immediate investigation of the actual tarball/commit and whether checksum enforcement is correct. Treat this package as requiring review of the upstream build contents (pom/plugins) and inspection/signing/verification of the resulting JAR before trust.

Confidence: 62%Severity: 78%
Audit Metadata
Analyzed At
Mar 29, 2026, 02:34 PM
Package URL
pkg:socket/skills-sh/arustydev%2Fai%2Fpkgmgr-homebrew-formula-dev%2F@a529047a8d915a4798e9d63d33d944c24e787848