piclist-upload

Warn

Audited by Socket on Feb 20, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/process.sh

The script is not obfuscated and contains no obvious backdoor or dynamically executed code, but it provides functionality that can exfiltrate any local files referenced by Markdown to a configured HTTP endpoint and will delete local image files by default. If PICLIST_SERVER is pointed to a malicious remote host (or an attacker can control the environment), sensitive data can be uploaded and removed from disk. Treat this as a moderate supply-chain risk: safe when running against a trusted local PicList server, but potentially dangerous if misconfigured or run in untrusted environments.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Feb 20, 2026, 12:31 PM
Package URL
pkg:socket/skills-sh/cat-xierluo%2Flegal-skills%2Fpiclist-upload%2F@4b854cad290faf255d42113fef4550ce8f06f24a