161-java-profiling-detect

Warn

Audited by Socket on Apr 23, 2026

1 alert found:

Anomaly
AnomalyLOW
references/161-java-profiling-detect.md

No clear evidence of intentional malware (e.g., credential theft, persistence, or outbound exfiltration) is present in the provided fragment. The main security concern is supply-chain integrity: the interactive profiler downloads and extracts async-profiler at runtime without checksum/signature verification, and then executes the extracted binaries. The script also attaches to and optionally terminates an operator-selected JVM PID, which increases operational impact. Recommend pinning and verifying tool artifacts (checksums/signatures), and restricting who can run/which PIDs can be targeted in sensitive environments.

Confidence: 70%Severity: 61%
Audit Metadata
Analyzed At
Apr 23, 2026, 06:09 PM
Package URL
pkg:socket/skills-sh/jabrena%2Fcursor-rules-java%2F161-java-profiling-detect%2F@5a235aaba83fe51982984bcb93d75076ed38d768