code-error-swallowing

Warn

Audited by Socket on Apr 21, 2026

1 alert found:

Security
SecurityMEDIUM
fixtures/sample.sh

No strong indicators of traditional malware (exfiltration, backdoor, credential theft, obfuscated execution) are present in this snippet. However, it deliberately performs high-impact operations (`rm -rf`, `npm publish`, `git push`) while suppressing failures (`|| true`, `/dev/null` redirection) and loosening error handling (`set +e`). This combination is security-relevant and would be hazardous if run outside a controlled regression context.

Confidence: 66%Severity: 72%
Audit Metadata
Analyzed At
Apr 21, 2026, 01:20 AM
Package URL
pkg:socket/skills-sh/laurigates%2Fclaude-plugins%2Fcode-error-swallowing%2F@bdda64733e06e5aa039919b313f50aa0d595bad0