didit-face-search
Audited by Socket on Mar 3, 2026
2 alerts found:
Obfuscated Filex2The artifact is documentation for integrating with Didit Face Search and does what it states: uploads user face images and receives similarity matches from vendor endpoints. The primary security concern is privacy risk from sending biometric data to a third-party service and operational risk from API key handling. There are no clear signs of malicious behavior, backdoors, or obfuscated exfiltration in the provided text. Recommendations: treat biometric data as highly sensitive (minimize storage), keep API keys server-side with rotation and monitoring, avoid logging URLs or images, secure programmatic registration workflows, and validate access controls for returned match_image_url resources. Overall, consider this a moderate supply-chain/privacy risk due to sensitive data handling and external dependencies; use only with appropriate data-protection controls and contractual terms.
This module is a straightforward CLI client that uploads a local image and optional metadata to a fixed third-party face-search API authenticated via an environment-stored API key. It does not contain typical malware constructs in the provided file, but it intentionally transfers highly sensitive biometric data and an API key to an external service — a privacy- and compliance-sensitive operation. Primary risks are data exfiltration to the remote service (intended) and supply-chain tampering altering the hardcoded endpoint or adding malicious code elsewhere. Recommendations: validate file type/size, avoid mislabeling MIME type, sanitize/limit vendor_data, avoid printing raw error responses in logs, enforce least-privilege for DIDIT_API_KEY, and review/trust the remote service and package provenance.