continuous-learning-v2
Audited by Socket on Mar 20, 2026
1 alert found:
AnomalyThis hook is not obviously malware (no network exfiltration, no backdoor or reverse shell), but it contains serious supply-chain/security issues: (1) direct interpolation of untrusted stdin into Python heredocs allows possible arbitrary code execution, (2) plaintext logging of tool inputs/outputs can leak secrets and PII to local files with no access controls, and (3) signaling a PID read from a file can be abused if the PID file is attacker-controlled. Remediation: avoid embedding untrusted data into code (use python -c reading from stdin or safe escaping), set restrictive file permissions, optionally encrypt or avoid storing sensitive payloads, validate PID file contents, and consider a safer parsing flow. Use caution before enabling this hook in environments that process untrusted data or handle secrets.