design-implementation
Warn
Audited by Socket on Apr 19, 2026
1 alert found:
AnomalyAnomalytools/server-manager.ts
LOWAnomalyLOW
tools/server-manager.ts
No strong indicators of intentional malware (no obfuscation, no secret theft, no data exfiltration, and no suspicious remote endpoints). However, the module meaningfully increases operational attack surface: it spawns a subprocess based on potentially attacker-controlled inputs (--command or package.json scripts) and can kill processes found by lsof for a chosen port. Additionally, it supports caller-supplied URLs for HEAD probing. In a trusted developer/CI context this may be acceptable, but as a dependency it should be reviewed for invocation controls and input sanitization/whitelisting of executable targets and allowed readiness URLs.
Confidence: 64%Severity: 57%
Audit Metadata