process-manager
Warn
Audited by Socket on Mar 29, 2026
1 alert found:
SecuritySecurityscripts/process-manager.ts
MEDIUMSecurityMEDIUM
scripts/process-manager.ts
No direct evidence of covert malware (no credentials, no obfuscated logic, no explicit exfiltration/persistence) is present in this module. However, it contains a critical high-impact sink: startProcess() performs config-driven arbitrary command execution by constructing and running a `sh -c` string from .claude/process-config.json fields (proc.command/proc.cwd) without escaping/validation. It can also disrupt processes via kill/kill -9 based on config ports, and it makes outbound requests to config-provided healthCheck URLs (possible SSRF/probing if config is tampered). This makes the security risk dominated by configuration integrity assumptions rather than stealthy malware.
Confidence: 78%Severity: 88%
Audit Metadata