rvt-to-ifc

Fail

Audited by Socket on Mar 5, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The Python wrapper itself is low-risk: readable, uses subprocess.run with an argument list (no shell=True), and performs reasonable input checks and simple validation. The primary and material security concern is the unsigned/undisclosed native converter executable (RVT2IFCconverter.exe / RvtExporter). Because the wrapper will execute that binary with the user's privileges and pass user-supplied arguments (paths and config), the executable could perform arbitrary, potentially malicious actions (file system modifications, network communication, credential access/exfiltration). Recommendations: obtain the native converter from a verified source, validate its checksum/signature, run it in an isolated environment (VM/container) before trusting it with sensitive data, and add path sanitization and optional integrity checks in the wrapper. The wrapper should also document provenance, provide safer defaults (e.g., deny writing outside a configured output root), and consider detecting unexpected network activity from the converter.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 5, 2026, 04:28 AM
Package URL
pkg:socket/skills-sh/datadrivenconstruction%2FDDC_Skills_for_AI_Agents_in_Construction%2Frvt-to-ifc%2F@33e27184379fd01b6689ff409d75fc9818100fc5