turso
Audited by Socket on Mar 9, 2026
2 alerts found:
Obfuscated FileAnomalyThe README itself contains no explicit malicious code, but it recommends high-risk installation patterns (curl ... | sh and irm ... | iex) that create a supply-chain execution vector: any compromise of the referenced release assets or distribution channel can lead to arbitrary code execution on user hosts. Because the installer and binaries are not provided, we cannot determine whether the package contains malware; treat the installation method as the primary security concern and follow the recommended mitigations (manual inspection, signature/checksum verification, least-privilege execution, safer distribution methods).
The remote installer pattern (curl | sh / irm | iex) represents a classic high-supply-chain-risk vector due to unverified remote code execution. To reduce risk, prefer: pinned, signed releases; checksums or signature verification; explicit installer provenance; use of package managers or container/VM images with verifiable hashes; and offline or CI-verified installation methods. Implement security controls around installer delivery, such as TLS pinning, content hashing, and code signing.