telegram-mini-app

Fail

Audited by Socket on Feb 15, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] The fragment is a benign, theory/guide-oriented design artifact intended to instruct on Telegram Mini App architecture with TON integration and monetization. It presents coherent capability coverage for its stated purpose and maintains proportional data access patterns for a typical mini app workflow. No overt malware indicators or credential harvesting mechanisms are evident in the material itself. However, as guidance, real implementations must validate initDataUnsafe, securely handle user data, and ensure that any wallet transactions or payments are performed through official, authenticated channels. Overall, the content is guidance-driven rather than a runnable package and requires proper configuration and security hardening before production. LLM verification: No evidence of malicious code or deliberate data exfiltration in the provided documentation and examples. The primary risks are: (1) insecure example usage of initDataUnsafe (risk of spoofed user data if developers do not validate initData), and (2) unpinned third-party dependency shown in install examples (minor supply-chain risk if copied without review). Recommend updating examples to demonstrate validating initData, pinning package versions, and warning about not committing payment/provider

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 15, 2026, 08:07 PM
Package URL
pkg:socket/skills-sh/davila7%2Fclaude-code-templates%2Ftelegram-mini-app%2F@7ac2b6c8ceabdb2ae113412b855b45cfb3377ede