turso

Fail

Audited by Socket on Mar 9, 2026

2 alerts found:

Obfuscated FileAnomaly
Obfuscated FileHIGH
references/installation.md

The README itself contains no explicit malicious code, but it recommends high-risk installation patterns (curl ... | sh and irm ... | iex) that create a supply-chain execution vector: any compromise of the referenced release assets or distribution channel can lead to arbitrary code execution on user hosts. Because the installer and binaries are not provided, we cannot determine whether the package contains malware; treat the installation method as the primary security concern and follow the recommended mitigations (manual inspection, signature/checksum verification, least-privilege execution, safer distribution methods).

Confidence: 98%
AnomalyLOW
references/quickstart.md

The remote installer pattern (curl | sh / irm | iex) represents a classic high-supply-chain-risk vector due to unverified remote code execution. To reduce risk, prefer: pinned, signed releases; checksums or signature verification; explicit installer provenance; use of package managers or container/VM images with verifiable hashes; and offline or CI-verified installation methods. Implement security controls around installer delivery, such as TLS pinning, content hashing, and code signing.

Confidence: 65%Severity: 66%
Audit Metadata
Analyzed At
Mar 9, 2026, 11:45 AM
Package URL
pkg:socket/skills-sh/itechmeat%2Fllm-code%2Fturso%2F@2a8e2393378bb4af4c74831f48ed2aedb1ae3b94