perl-cpan-ecosystem
Audited by Socket on Mar 3, 2026
1 alert found:
SecurityThis skill is a benign, practical guide for Perl dependency management and is coherent with its stated purpose. The primary security concern is the inclusion of a curl | perl bootstrap (cpanmin.us) and other unverified network-based installs; these are legitimate, widely-used install patterns for cpanm but are inherently supply-chain risky because they execute remote code without explicit integrity verification. Other risks are standard for package management: transitive dependency exposure, use of elevated package-manager privileges, and recommending flags (--notest, --force) that bypass safety checks. There is no evidence of credential harvesting, obfuscated or hidden backdoors, or instructions to exfiltrate data. Recommend: (1) prefer installing cpanm from a package manager or verify the bootstrap script with signatures/checksums if available; (2) avoid --force/--notest unless necessary; (3) use Carton with committed cpanfile.snapshot for reproducible installs; (4) be aware of privilege implications when using sudo installers.