tmux
Audited by Socket on Feb 28, 2026
1 alert found:
MalwareThis is a practical tmux usage guide with legitimate debugging and monitoring use cases. The primary security concern is the explicit instruction to bypass local command-inspection hooks using tmux load-buffer + paste-buffer; that advice is an active evasion technique that can be used to run privileged commands (e.g., sudo) while avoiding audit/inspection. Combined with instructions to send arbitrary commands into other panes and capture their output, the document provides a clear mechanism for command execution and local data reading that could be abused by an automated agent. There are no remote download/execution patterns or external exfiltration endpoints in the text, but local privileged execution and secret-capture flows are the salient risks. Recommend removing or strongly qualifying the hook-bypass section, adding explicit warnings about executing arbitrary commands in panes (especially with sudo), and requiring explicit user confirmation before automated agents perform send-keys/paste-buffer operations against panes that may run privileged contexts.