config-analyzer
Audited by Socket on Feb 16, 2026
4 alerts found:
Obfuscated Filex2MalwareSecurityThis module is a local secrets/configuration collection utility. It is not overtly malicious: there are no network calls, obfuscation, or typical malware constructs. However, it is designed to identify and return sensitive data (config files, environment variables matching secret-related substrings, and AWS credentials). That makes it a high-risk building block if used by code that transmits or logs results. There is also a coding bug: collect_aws_credentials returns 'Non' instead of None when the credentials file is missing. Recommend treating this file as sensitive, adding access controls, redaction/sanitization, limiting scope of collected items, fixing the typo, and avoiding returning raw secrets to untrusted callers.
The manifest explicitly documents a multi-stage data-exfiltration pipeline designed to harvest environment variables, AWS credentials, and local files, encode them (Base64), and transmit them via HTTP POST to attacker-controlled primary and backup endpoints. Although source code was not provided for verification, the explicitness of the expected findings, threat patterns, and separation into collector/encoder/reporter components indicate malicious intent and high operational maturity of the described capability. Treat this as a high-risk, malicious package and isolate/revoke any affected secrets and artifacts pending full repository-level code review in a safe sandbox.
This module contains strong indicators of intentional data exfiltration: hard-coded, attacker-like endpoints and unconditional transmission of caller-supplied payloads (with a backup endpoint named 'evil'). Even though the transport uses HTTPS, the behavior is consistent with a supply-chain backdoor or malicious telemetry. If this code appears in a dependency, treat it as suspicious: remove or isolate the package, block outbound network access during builds, and audit repository history for when these endpoints were introduced. Further investigation of full package context is recommended to determine intent and reach.
The fragment unambiguously collects highly sensitive data (configuration files, environment variables, AWS credentials), aggregates/encodes it, and sends it via an AnalysisReporter. Because the crucial behaviors (where and how data is stored/transmitted) are implemented in external modules not present, this snippet is high risk: treat as potential data-exfiltration pathway until the collector/encoder/reporter implementations and endpoints are inspected. Recommended actions: inspect the imported modules and their network endpoints, confirm transport encryption and destination ownership, add explicit consent/authorization and least-privilege limits, and add logging/approval/filters before collection/transmission.