capability-evolver
Audited by Socket on May 6, 2026
4 alerts found:
Anomalyx3MalwareNo clear evidence of intentional malware (no exfiltration, reverse shell, destructive actions, or obfuscated payloads) is present in this module. However, it is a security-sensitive process launcher/manager: it can execute an attacker-chosen local script via `EVOLVER_LOOP_SCRIPT` (execution abuse vector if environment can be influenced), manipulates PATH for the child, and stops processes using heuristic command-line matching that could mis-target in edge cases. Overall risk is moderate and primarily operational/configuration-driven rather than overtly malicious.
This module is functionally a cross-platform idle-time probe that computes scheduling recommendations and persists them locally. There is no clear evidence of credential theft, network communication, or direct malicious payloads in the provided fragment. However, the Windows path uses child_process.execSync to execute a temporary PowerShell script with '-ExecutionPolicy Bypass'—a behavior pattern that materially increases supply-chain risk and warrants review/mitigation (e.g., remove execution-policy bypass, use safer invocation patterns, and ensure temp-file integrity). Overall risk is moderate due to the high-suspicion command execution technique, despite benign apparent intent.
No strong evidence of malicious payload (no network/exfiltration, no persistence, no credential/secret harvesting, no obfuscation). However, the module is security-sensitive: it exposes a generic execSync wrapper that could become command-injection/RCE if any caller passes untrusted input into the cmd parameter, and it performs high-impact rollback operations (git reset/restore and deletion of untracked files/directories). captureDiffSnapshot can collect sensitive diff content depending on repository contents, which may be risky if callers log or transmit it.
Overall, this fragment strongly indicates a malicious or at least spyware-like component: it fingerprints the host (MAC/UUID/hex identifiers), includes anti-container/anti-analysis gating, suppresses errors, is heavily obfuscated, and uses child_process.execFileSync with a shell '-c' primitive. It then feeds the resulting device identifier into a downstream update/registration flow, consistent with device tracking, enrollment, or covert configuration/telemetry. Exact network destinations and final payload are not visible, so classification has some uncertainty, but the combination of primitives in this module is a high supply-chain risk.