code-error-swallowing
Warn
Audited by Socket on Apr 21, 2026
1 alert found:
SecuritySecurityfixtures/sample.sh
MEDIUMSecurityMEDIUM
fixtures/sample.sh
No strong indicators of traditional malware (exfiltration, backdoor, credential theft, obfuscated execution) are present in this snippet. However, it deliberately performs high-impact operations (`rm -rf`, `npm publish`, `git push`) while suppressing failures (`|| true`, `/dev/null` redirection) and loosening error handling (`set +e`). This combination is security-relevant and would be hazardous if run outside a controlled regression context.
Confidence: 66%Severity: 72%
Audit Metadata