imsg

Fail

Audited by Socket on Feb 27, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

The imsg CLI's described functionality is legitimate for managing Messages from the terminal but inherently high-risk: it requires macOS Full Disk Access (for reading messages/attachments) and Automation permission to control Messages.app (for sending). Those privileges enable realistic exfiltration and impersonation paths if an attacker or automated agent can execute the CLI. I find no evidence in the provided fragment of explicit malicious code, obfuscation, hard-coded credentials, or remote attacker-controlled network interactions; the risk arises from the powerful capabilities and required system permissions. Recommended controls: run under a dedicated, least-privileged Apple ID; restrict who/what can execute the CLI (avoid running from untrusted automation agents); require explicit interactive confirmation or out-of-band approvals before sending; enable logging/monitoring of send activity; and minimize granting Full Disk Access to only trusted processes. Treat this package as a moderate-to-high security risk in automated or shared environments.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 27, 2026, 06:47 PM
Package URL
pkg:socket/skills-sh/joelhooks%2Fjoelclaw%2Fimsg%2F@daa460c3843d332e2221b53c7816088f9d6cc037