incident-response
Warn
Audited by Socket on Mar 27, 2026
1 alert found:
AnomalyAnomalyscripts/collect-evidence.sh
LOWAnomalyLOW
scripts/collect-evidence.sh
Best report is Report 1: the script appears to be a legitimate incident-response evidence collector with no direct malware behaviors (no networking/exfiltration/persistence/obfuscation in the shown code). However, the code is dual-use and high-sensitivity: it harvests authentication logs, user/account databases, and detailed process/network state, stages them under /tmp without explicit umask/chmod, and uses an unsanitized user-provided incident-id in filesystem path construction. These are the primary security concerns to review/mitigate (restrict permissions, validate/sanitize incident-id, and avoid packaging sensitive evidence into globally accessible locations).
Confidence: 72%Severity: 52%
Audit Metadata