apm-usage
Warn
Audited by Socket on Apr 17, 2026
1 alert found:
AnomalyAnomalyinstallation.md
LOWAnomalyLOW
installation.md
The fragment is installation guidance rather than package source code. The primary supply-chain risk is the “quick install” method that directly executes remotely fetched scripts (`curl ... | sh` / `irm ... | iex`) with no integrity verification shown here. While no concrete malicious logic is visible in the snippet itself, the security of the installation effectively depends on the integrity and behavior of the remote installer endpoints. Review/pin/verify the downloaded installer (e.g., checksum/signature), or prefer package-manager installation where feasible.
Confidence: 56%Severity: 63%
Audit Metadata