celestia

Fail

Audited by Socket on Feb 28, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
references/features-fraud-proofs.md

No evidence in this specification of typical malware behaviors (no credential exfiltration, command execution, reverse shell, or obfuscation). The primary concern is protocol-level: the BEFP path provides a network-driven, high-impact sink (persistent storage + halting of critical services and re-broadcast) that, if verification or peer authentication is flawed, could enable widespread denial-of-service or network disruption. Before trusting an implementation, ensure: strict cryptographic verification of proofs, peer authentication and accountability for proof origin, replay/preimage protections, rate-limiting for fraud pull requests and pubsub validators, robust blacklisting safeguards to avoid fragmentation, and clear operational tooling for recovery from false positives. The artifact appears intentionally defensive but carries moderate-to-high operational risk if not implemented with care.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 28, 2026, 09:47 PM
Package URL
pkg:socket/skills-sh/hairyf%2Fblockchain-master%2Fcelestia%2F@cbdf4824f1a08ed462ea8a775a521ae8bb04e1a3