process-manager

Warn

Audited by Socket on Mar 29, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/process-manager.ts

No direct evidence of covert malware (no credentials, no obfuscated logic, no explicit exfiltration/persistence) is present in this module. However, it contains a critical high-impact sink: startProcess() performs config-driven arbitrary command execution by constructing and running a `sh -c` string from .claude/process-config.json fields (proc.command/proc.cwd) without escaping/validation. It can also disrupt processes via kill/kill -9 based on config ports, and it makes outbound requests to config-provided healthCheck URLs (possible SSRF/probing if config is tampered). This makes the security risk dominated by configuration integrity assumptions rather than stealthy malware.

Confidence: 78%Severity: 88%
Audit Metadata
Analyzed At
Mar 29, 2026, 09:46 AM
Package URL
pkg:socket/skills-sh/jwynia%2Fteach%2Fprocess-manager%2F@d38449efda34e22e9a29664ca84fa575f8f4f36b