inbound-cli
Audited by Socket on Mar 9, 2026
3 alerts found:
Obfuscated Filex3No clear signs of malware or obfuscation in the fragment. The primary security concern is the insecure pattern of fetching attachment.downloadUrl values taken from webhook payloads while including the server API key in the Authorization header: this enables SSRF and credential exfiltration if payloads are attacker-controlled or webhook verification is bypassed. Secondary issues: logging untrusted data and returning potentially sensitive error objects. Apply hostname allowlisting, strict webhook verification, and avoid sending secrets to untrusted endpoints to remediate.
The code implements a standard notification with Redis-backed cooldown and an email send via an inbound service. There are no explicit malicious behaviors detected (no dynamic code execution, no hardcoded secrets). The main security considerations involve proper handling of sensitive data in logs, ensuring environment credentials are protected, and validating inputs before use. The cooldown logic helps mitigate abuse. Overall, the fragment appears to be legitimate application logic with moderate security risk primarily due to potential data leakage via logs and reliance on external services.
The plan outlines legitimate operator tooling to enforce abuse responses (tenant suspension, user bans, domain blocks) and includes sensible mitigations (dry-run default, explicit execute/confirm). There is no direct evidence of obfuscated or explicitly malicious intent in the plan text itself. However, the proposed capabilities are high-impact: if the INBOUND_API_KEY or admin privileges are compromised, an attacker or accidental actor could suspend tenants, ban users, and block domains at scale. Before implementation, add stronger key scoping/rotation, multi-factor or multi-party confirmation for destructive executes, immutable audit logging to an external system, RBAC separation for actions, robust input validation, and transactional/compensation handling for multi-step flows to reduce the risk of accidental or malicious misuse.