helo-world

Fail

Audited by Socket on Mar 10, 2026

2 alerts found:

Malwarex2
MalwareHIGH
index.ts

This code is malicious and presents a high security risk. It actively reads environment secrets and attempts to exfiltrate them to attacker-controlled domains via child_process.exec (curl) and fetch, uses dynamic code execution (eval and new Function) to access/execute code, and references local credential file locations. Even if some constructs would raise runtime errors as-is, the intent and direct exfiltration command (exec with curl including AWS_SECRET_KEY) make this unsuitable for use. Remove and do not execute; treat any environment or keys present on a host where this ran as potentially compromised.

Confidence: 90%Severity: 95%
MalwareHIGH
package.json

This install script is malicious or extremely high risk: it executes a remote script fetched over insecure HTTP and depends on at least one suspicious package. Do not install. Treat this as a confirmed malware installation vector until proven otherwise; inspect the remote script and all dependencies in a safe, isolated environment if you must analyze further.

Confidence: 98%Severity: 100%
Audit Metadata
Analyzed At
Mar 10, 2026, 12:53 AM
Package URL
pkg:socket/skills-sh/britrik%2Fskill-vettr%2Fhelo-world%2F@ed8d8ecb5d1cb0693a50b3f50f1aae02842a8b3a