jk
Audited by Socket on Feb 25, 2026
1 alert found:
MalwareThis document is a usage guide for a Jenkins CLI and not executable code itself, but it describes capabilities and install paths that carry supply-chain and credential risks. Key concerns: (1) multiple third-party distribution channels and direct binary installs increase supply-chain attack surface; (2) explicit support for skipping TLS verification and allowing insecure storage is a high-risk feature that can enable credential interception and local leakage; (3) the CLI exposes powerful credential and administrative operations that, if the installed binary is malicious or compromised, could be used to exfiltrate or destroy sensitive Jenkins data. There is no definitive evidence in the documentation that the tool is malicious, but the combination of download-execute instructions, third-party distribution points, and options that weaken TLS/storage trust justify treating this as a medium-to-high security risk until the binary source and storage/encryption details are verified. Recommend verifying the publisher's authenticity, reviewing the jk binary source code and release artifacts, avoiding --insecure and --allow-insecure-store in production, and restricting the tokens used with principle of least privilege.