jeo

Warn

Audited by Socket on Mar 9, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/install.sh

The script itself does not contain explicit malicious payloads (no credential harvesting, reverse shell, obfuscation, or known exfiltration behavior). However it performs high-risk operations: executing remote installers (curl | bash) and invoking package runners (npm/npx/bunx) that fetch and run code from external registries, and uses eval to run constructed commands. These behaviors pose a moderate supply-chain security risk: if upstream sources are compromised or a package is malicious, the installer will execute that code on the user's machine. Recommended mitigation: avoid piping remote scripts directly to shell, verify checksums/signatures of remote installers, review upstream package source code before installing, and run in isolated environments (containers or VMs) if uncertain.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 9, 2026, 09:15 AM
Package URL
pkg:socket/skills-sh/JEO-tech-ai%2Foh-my-unity3d%2Fjeo%2F@6fc2f9275c2fa40b55cd3c587aa9e23656e30503