jarvis-mission-control

Warn

Audited by Socket on Apr 5, 2026

1 alert found:

Anomaly
AnomalyLOW
server/index.js

No clear, direct malware/backdoor behavior is present in the provided fragment. The most security-relevant behavior is the ability to execute system commands via POST /api/cli/run; however, it appears constrained by a strict whitelist and uses execFile (not shell), reducing injection risk. The other notable risks are data exposure (WebSocket broadcasting of event payloads) and stored content persistence to disk (GitHub issue bodies and agent soul markdown), which could become XSS depending on how the dashboard renders it (not shown). Configuration/environment loading from a local .missiondeck file increases the impact of filesystem tampering but is plausibly intended. Overall: medium security risk due to high-privilege sinks (execFile, file writes, broadcast), but low evidence of intentional sabotage/malware in this fragment alone.

Confidence: 62%Severity: 58%
Audit Metadata
Analyzed At
Apr 5, 2026, 02:38 PM
Package URL
pkg:socket/skills-sh/asif2bd%2Fjarvis-mission-control-openclaw%2Fjarvis-mission-control%2F@b30f40e098d7fb610eb4cb5e83bd8c9b3ae4b8cd