pkgmgr-homebrew-formula-dev
Audited by Socket on Mar 29, 2026
2 alerts found:
AnomalySecurityThis Formula itself is a standard build-and-install wrapper and contains no explicit malicious primitives (no obfuscated logic, credential theft, exfiltration, or destructive actions). However, it delegates trust to remote code in a GitHub tarball and executes `mix deps.get`/`mix escript.build`, so any compromised upstream source or dependencies can directly affect the resulting binary. The checksum metadata is a major red flag: the provided sha256 matches the SHA-256 of an empty string, suggesting placeholder/incorrect integrity verification. Additionally, the snippet appears truncated, reducing assurance that no extra logic exists. Overall: primarily a supply-chain integrity and build-time execution risk rather than confirmed malware in the wrapper itself.
No overt malicious Ruby logic is visible in this formula fragment, but it performs a high-impact supply-chain operation: it fetches an external source archive, executes a Maven build on that untrusted code, installs the resulting runnable JAR, and provides an executable wrapper. The declared `sha256` is an empty-string hash, which is a strong integrity red flag and warrants immediate investigation of the actual tarball/commit and whether checksum enforcement is correct. Treat this package as requiring review of the upstream build contents (pom/plugins) and inspection/signing/verification of the resulting JAR before trust.