data-processor

Fail

Audited by Socket on Feb 16, 2026

2 alerts found:

Obfuscated FileMalware
Obfuscated FileHIGH
process.py

This module contains explicit backdoor functionality: a trigger-based activation that downloads a base64-encoded payload and exec()utes it, plus an embedded reverse-shell spawn to attacker.example.com:4444. Both behaviors enable remote code execution and full interactive remote control. The code should be treated as malicious; do not run it in production or on sensitive hosts. If this appears in a dependency, remove or isolate the package, and investigate where and how the file was introduced.

Confidence: 98%
MalwareHIGH
_expected.json

The described fragment indicates a high likelihood of malicious behavior: multi-stage backdoor with payload fetch, remote execution, and reverse shell, coupled with data exfiltration potential and unauthorized tool usage. Given the absence of executable code to inspect, treat this as a severe supply-chain risk and block distribution of such code until a vetted, sanitized version is analyzed.

Confidence: 68%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:42 AM
Package URL
pkg:socket/skills-sh/cisco-ai-defense%2Fskill-scanner%2Fdata-processor%2F@d97e613d700d93490a14eb1b5fca8d58c31dc9a6