electrobun-rpc-patterns

Warn

Audited by Socket on Mar 2, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

This skill is documentation and example code for Electrobun RPC patterns and does not contain explicit backdoors, obfuscated payloads, or network-based exfiltration. The primary security concerns are feature-abuse risks inherent to IPC: unvalidated executeCommand (arbitrary process execution), ability to read and stream arbitrary files to the webview (potential data exposure), dynamic method invocation in batch execution, and weak path validation for saves. These are not proven malware but are moderate supply-chain/security risks if the webview or any caller to these RPC endpoints is untrusted. Mitigations: enforce caller authentication/authorization for sensitive RPCs, restrict allowed commands and file path roots, perform robust path canonicalization and sandboxing, and implement allowlists for batch/executable methods. Overall, the code is plausible and useful for its stated purpose but requires access-control hardening before use in environments with untrusted web content.

Confidence: 80%Severity: 75%
Audit Metadata
Analyzed At
Mar 2, 2026, 04:23 AM
Package URL
pkg:socket/skills-sh/gyorkluu%2Felectrobun-skills%2Felectrobun-rpc-patterns%2F@f79e21570797e32076afb71f76e2bd015e170d66