cast
Audited by Socket on Feb 27, 2026
1 alert found:
MalwareThe documentation itself does not contain malicious code, but it describes workflows and installation/update patterns that present supply-chain and operational risks: unverified pipe-to-shell installation, an updater (foundryup) that can fetch updates later, guidance to disable sandboxing, and examples that show private keys passed via environment/CLI. Recommend: avoid pipe-to-shell installs; require/advise verification of installers (checksums, signatures, pinned versions); avoid instructing users to disable sandboxing — instead provide workarounds that preserve isolation; encourage using hardware wallets, ephemeral signing, or dedicated signing services rather than raw private keys in env vars; and emphasize verifying RPC endpoints before use. Overall risk is moderate and manageable with better operational guidance.