command_injection_test

Warn

Audited by Socket on Feb 26, 2026

1 alert found:

Security
SecurityMEDIUM
TOOL.py

The module contains multiple high-severity insecure coding patterns: command injection risks via subprocess.run(..., shell=True) and os.system(f"cat {filename}"), and direct arbitrary code execution via exec(open(script_path).read()). These allow full code execution and data disclosure if inputs are attacker-controlled. Fixes: avoid shell=True and string interpolation, use subprocess with argument lists or direct file I/O, and never exec file contents from untrusted sources; validate and sandbox inputs. The syntax error in run_user_script should be corrected, but correcting it only restores the dangerous functionality.

Confidence: 80%Severity: 85%
Audit Metadata
Analyzed At
Feb 26, 2026, 03:19 PM
Package URL
pkg:socket/skills-sh/Charpup%2Fskill-security-auditor%2Fcommand-injection-test%2F@ffa61bd8bc761521d69fd90a59a2c633f70fc12d