dbos-python

Fail

Audited by Socket on Feb 15, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
references/pattern-classes.md

The fragment is a benign example demonstrating DBOS class usage. The only network-related operation is a normal HTTP GET to a user-supplied URL, which is expected behavior for a data-fetch workflow. No malicious patterns (backdoors, data exfiltration, hardcoded secrets, or obfuscated code) are present. Overall, low malware likelihood with moderate security risk due to external network access in typical app contexts.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 15, 2026, 08:29 PM
Package URL
pkg:socket/skills-sh/dbos-inc%2Fagent-skills%2Fdbos-python%2F@a28faab314aed88b4db9692d71fe26725f81eaa0