code-execution
Audited by Socket on Feb 15, 2026
1 alert found:
Obfuscated FileThe component provides legitimate and useful capabilities for local bulk code analysis and refactoring. I found no explicit signs of embedded malware in the supplied text, but there are multiple supply-chain and privilege risks: an uninspected setup script, powerful filesystem write and git push capabilities that can lead to exfiltration, and misleading documentation claiming 'metadata only' while examples show direct source reads. Recommend auditing the setup.sh and any installed runtime components, enforcing least-privilege usage (deny git_push by default, require explicit path scopes), and adding runtime safeguards (consent prompts, dry-run, and preventing outputs that include raw source). With those controls the tool can be used safely; without them it represents a moderate supply-chain/security risk.