production-hardening
Audited by Socket on Mar 13, 2026
1 alert found:
Obfuscated FileThe wrapper script itself contains no directly malicious code: it performs repository checks and basic validations. However it materially increases supply-chain risk by making and executing scripts/scan.sh from the repository without sandboxing, network restrictions, or logging (output is suppressed). A malicious or compromised scan.sh could exfiltrate secrets, modify or delete files, or perform other harmful actions with the privileges of the test runner. Recommendations: (1) Do not execute untrusted repository code on hosts containing secrets; run this test in an isolated environment (ephemeral container/VM) with network egress blocked or tightly controlled. (2) Preserve and review execution output rather than redirecting to /dev/null to aid detection. (3) Prefer performing static analysis (linters, limited interpreter sandboxing) on scan.sh before execution. (4) Avoid changing repository state when possible (do not chmod in-place; run via a copied file), and apply timeouts and resource limits when executing test scripts.