pdf-dft-extractor

Warn

Audited by Socket on Mar 30, 2026

1 alert found:

Anomaly
AnomalyLOW
extract_dft.py

No overt malware behaviors (e.g., eval/exec, shell/subprocess, direct network code) are present in this snippet. The dominant security concern is supply-chain/import integrity: the script modifies sys.path to load pdf_to_markdown from a user home directory without verification, and then retrieves an API token and passes it into an external conversion function whose behavior is not visible here. If the imported module or scripts directory is tampered with, this process could be used to execute malicious code and/or misuse the API token. Treat the dependency/skill as untrusted and verify provenance (hash/signature), especially the pdf_to_markdown module.

Confidence: 60%Severity: 66%
Audit Metadata
Analyzed At
Mar 30, 2026, 06:46 AM
Package URL
pkg:socket/skills-sh/InternScience%2FChemClaw%2Fpdf-dft-extractor%2F@d84d2059ea53c5359d38f8c5116cfdc95f95b0b7