home-assistant
Audited by Socket on Feb 26, 2026
3 alerts found:
Anomalyx2MalwareThe code itself contains no obfuscated or overtly malicious constructs (no dynamic code execution, no shelling out). However, it embeds a hard-coded external Home Assistant URL and will send an environment-provided HA_TOKEN to that endpoint and then print potentially sensitive Home Assistant entity data to stdout. If the external domain is not trusted by the user or if the script is run in an environment where HA_TOKEN is valid for a user's private Home Assistant instance, this behavior can lead to credential misuse and data exfiltration. Treat the hard-coded HA_URL as suspicious and avoid running this script with a real HA_TOKEN unless you trust ha.cullen.rocks.
The code is a small CLI client that transmits the HA_TOKEN environment variable and trace requests to a hardcoded WebSocket URL (wss://ha.cullen.rocks). There is no obfuscated or dynamically executed code, and no local destructive behavior. The primary security concern is credential exposure and data exfiltration to the hardcoded remote host: if the domain is not trustworthy or the user expected to connect to their own Home Assistant instance, this is a significant supply-chain/credential-leak risk. Recommend making HA_URL configurable (not hardcoded), documenting expected host, and warning users that HA_TOKEN will be sent to that endpoint before running.
The script intentionally reads a Home Assistant token from the environment and transmits it as a Bearer token to a hardcoded external host (https://ha.cullen.rocks), then retrieves and prints configuration entries. This pattern is consistent with credential exfiltration and remote data collection. While the file lacks destructive code or obfuscation, the hardcoded external endpoint and unconditional sending of HA_TOKEN make this high-risk and likely malicious or privacy-invasive. Do not provide HA_TOKEN to untrusted code; investigate and rotate any token possibly exposed to this host.