production-hardening

Fail

Audited by Socket on Mar 13, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
tests/smoke.sh

The wrapper script itself contains no directly malicious code: it performs repository checks and basic validations. However it materially increases supply-chain risk by making and executing scripts/scan.sh from the repository without sandboxing, network restrictions, or logging (output is suppressed). A malicious or compromised scan.sh could exfiltrate secrets, modify or delete files, or perform other harmful actions with the privileges of the test runner. Recommendations: (1) Do not execute untrusted repository code on hosts containing secrets; run this test in an isolated environment (ephemeral container/VM) with network egress blocked or tightly controlled. (2) Preserve and review execution output rather than redirecting to /dev/null to aid detection. (3) Prefer performing static analysis (linters, limited interpreter sandboxing) on scan.sh before execution. (4) Avoid changing repository state when possible (do not chmod in-place; run via a copied file), and apply timeouts and resource limits when executing test scripts.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 13, 2026, 07:27 AM
Package URL
pkg:socket/skills-sh/chandima%2Fopencode-config%2Fproduction-hardening%2F@d71e8507f0917f35569328f154a7da56fa3babeb