open-terminal-guide
Audited by Socket on Mar 8, 2026
3 alerts found:
Anomalyx2SecurityThe documentation fragment describes a highly capable remote terminal environment with command execution, file manipulation, notebooks, and a proxy. While such features can be legitimate for a self-hosted terminal service, they introduce substantial attack surface for supply-chain and runtime abuse if not implemented with stringent security controls. Key imperative improvements include: strong authentication/authorization, per-session isolation and sandboxing, command whitelisting and timeouts, strict input validation, comprehensive auditing/logging, secure handling of env/credentials, and restricted access to internal resources. Without these, the risk remains high for remote code execution, data exposure, and unintended network access.
No clear signs of intentionally malicious code are present in the provided project description. The package implements legitimate but high-risk functionality: remote shell execution, PTY terminals over WebSocket, notebook kernel execution, file write/replace, and local port detection/proxying. If authentication (API key handling) or deployment isolation is misconfigured, these features allow full host-level command execution and data exfiltration. Treat this package as operationally sensitive: require strong authentication, restrict network exposure, run in isolated containers, and audit entrypoint and verify_api_key implementations before use.
The skill describes a substantial self-hosted terminal API with broad capabilities (command execution, file operations, PTY sessions, and proxying). While Docker deployment and official registries mitigate some supply-chain risk, the architecture inherently enables near-direct command execution on the host and potential exposure of internal services and files. The documented data flows and authentication mechanisms are plausible, but the presence of an unprotected /health endpoint and the /proxy path to internal hosts, combined with the ability to spawn arbitrary processes and stream their output, create meaningful risk if not tightly controlled (RBAC, strict sandboxing, log redaction, and network ACLs). Overall, the footprint is coherent with a remote terminal API but warrants Suspicious due to high-risk command execution and internal-proxy capabilities; treat as Benign only with rigorous deployment-time safeguards and strong access controls.