turso-db
Audited by Socket on Feb 22, 2026
1 alert found:
Malware[Skill Scanner] URL pointing to executable file detected The documentation is consistent with a legitimate native in-process database project providing a CLI and native Node.js client. The primary security concern in the provided fragment is the recommended curl | sh installer pattern (remote script execution without checksum/signature), which is a high-risk supply-chain practice. Native binaries and native npm modules increase attack surface compared with pure-JS packages. There are no explicit signs of malware, hard-coded credentials, or obfuscated code in the fragment; however, absence of evidence is not evidence of absence — inspecting the installer script and native artifacts is required for higher confidence. Recommended mitigations: avoid pipe-to-shell; obtain installer artifacts via package managers or download and verify checksums/signatures; review installer script before execution; prefer audited package channels and pinned releases. LLM verification: The file is a documentation/installation guide for Turso DB and is not itself executable code. The highest-risk items are the recommended installation methods: a curl|sh installer from a 'latest' release URL and unpinned npm installs. These patterns introduce supply-chain risk (remote code executed on the host without integrity verification). I did not find embedded malicious code in the document; however, because the documentation instructs users to fetch and run remote artifacts, it should be