open-terminal-guide

Warn

Audited by Socket on Mar 29, 2026

1 alert found:

Security
SecurityMEDIUM
references/api.md

This fragment is API documentation for a remote execution and filesystem/proxy control service. It describes multiple high-impact sinks (shell command execution, interactive PTY sessions, Jupyter kernel execution, arbitrary file write/replace/delete, server-side URL fetching, and a localhost reverse proxy). If authorization is bypassable or misconfigured, it enables full system compromise and strong internal reconnaissance/SSRF. There is no concrete evidence of malware/stealth mechanisms in the provided text (no obfuscation, no exfiltration domains, no persistence code shown), but the exposed capabilities themselves represent an extremely high security risk for a supply-chain dependency.

Confidence: 45%Severity: 85%
Audit Metadata
Analyzed At
Mar 29, 2026, 05:27 PM
Package URL
pkg:socket/skills-sh/nordz0r%2Fskills%2Fopen-terminal-guide%2F@5c6b82959e4e36bc51037070f4f2ecd9a245323e