price-hunter
Audited by Socket on Mar 6, 2026
1 alert found:
Obfuscated FileFunctionally, the package aligns with its stated purpose of searching and tracking grocery prices and persisting results locally. I did not observe explicit malicious code, obfuscation, or hardcoded credentials in the provided files. However, there are moderate security concerns: (1) potential SQL injection and shell command injection if user-controlled item/store/price/unit values are naively interpolated into sqlite3 calls or shell script arguments; (2) execution of local scripts without documented review or sandboxing is a supply-chain/execution risk; (3) vague, undocumented data-sharing with 'shopping-agent' creates an exfiltration/privacy risk. Recommended mitigations before deploying: inspect and audit all scripts under skills/price-hunter/scripts, switch to parameterized DB queries (no direct string concatenation into SQL), avoid shell interpolation by calling executables with safe argv arrays or using DB bindings, limit filesystem access to the DB (proper permissions), and document/limit exactly what is shared with 'shopping-agent' and how it is authorized. With these mitigations applied, the package would be acceptable for use in trusted environments.