apm-usage

Warn

Audited by Socket on Apr 17, 2026

1 alert found:

Anomaly
AnomalyLOW
installation.md

The fragment is installation guidance rather than package source code. The primary supply-chain risk is the “quick install” method that directly executes remotely fetched scripts (`curl ... | sh` / `irm ... | iex`) with no integrity verification shown here. While no concrete malicious logic is visible in the snippet itself, the security of the installation effectively depends on the integrity and behavior of the remote installer endpoints. Review/pin/verify the downloaded installer (e.g., checksum/signature), or prefer package-manager installation where feasible.

Confidence: 56%Severity: 63%
Audit Metadata
Analyzed At
Apr 17, 2026, 12:34 PM
Package URL
pkg:socket/skills-sh/microsoft%2Fapm%2Fapm-usage%2F@f7a4cd9676eb1626e1a3270c48f9cc8cf2dafd23