161-java-profiling-detect
Warn
Audited by Socket on Apr 23, 2026
1 alert found:
AnomalyAnomalyreferences/161-java-profiling-detect.md
LOWAnomalyLOW
references/161-java-profiling-detect.md
No clear evidence of intentional malware (e.g., credential theft, persistence, or outbound exfiltration) is present in the provided fragment. The main security concern is supply-chain integrity: the interactive profiler downloads and extracts async-profiler at runtime without checksum/signature verification, and then executes the extracted binaries. The script also attaches to and optionally terminates an operator-selected JVM PID, which increases operational impact. Recommend pinning and verifying tool artifacts (checksums/signatures), and restricting who can run/which PIDs can be targeted in sensitive environments.
Confidence: 70%Severity: 61%
Audit Metadata