octobot-stack

Fail

Audited by Socket on Feb 17, 2026

2 alerts found:

AnomalyObfuscated File
AnomalyLOW
octobot-tentacles-manager/references/commands.md

The snippet demonstrates benign command usage for a plugin manager but exposes standard supply-chain risks when installing from remote URLs without visible integrity or authenticity guarantees. The risk is moderate-to-low if robust safeguards (signatures, checksums, allowlisted sources, sandboxed execution) are in place; without them, remote plugins could introduce arbitrary code. Recommend mandating cryptographic verification, trusted source pinning, and safe loading practices to mitigate supply-chain threats.

Confidence: 61%Severity: 52%
Obfuscated FileHIGH
octobot/SKILL.md

The provided repository documentation describes a legitimate trading orchestrator but exposes multiple supply-chain and operational risks: plaintext credential storage in config files, dynamic execution of unverified tentacle plugins, an under-specified web control surface, and lack of guidance for secret management, plugin validation, and secure logging. There is no direct evidence of malware in the supplied text, but the described architecture makes high-impact misuse plausible if a tentacle or dependency is malicious or if deployment is insecure. Recommended mitigations: store secrets in a secure vault or OS keyring, require cryptographic signing and review of tentacles/plugins, sandbox plugin execution (separate processes with minimal privileges), enforce authenticated/TLS-protected web UI access and bind to localhost by default, redact sensitive fields from logs, and document explicit official exchange endpoints and certificate validation. Treat tentacles as untrusted code and adopt least-privilege deployment practices.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 17, 2026, 08:18 AM
Package URL
pkg:socket/skills-sh/Herklos%2FOctoBot-Stack-VS-Workspace%2Foctobot-stack%2F@2377a587576123bf1c7d124cebd3accc6f6ed540