jeo
Audited by Socket on Mar 9, 2026
1 alert found:
AnomalyThe script itself does not contain explicit malicious payloads (no credential harvesting, reverse shell, obfuscation, or known exfiltration behavior). However it performs high-risk operations: executing remote installers (curl | bash) and invoking package runners (npm/npx/bunx) that fetch and run code from external registries, and uses eval to run constructed commands. These behaviors pose a moderate supply-chain security risk: if upstream sources are compromised or a package is malicious, the installer will execute that code on the user's machine. Recommended mitigation: avoid piping remote scripts directly to shell, verify checksums/signatures of remote installers, review upstream package source code before installing, and run in isolated environments (containers or VMs) if uncertain.