open-terminal-guide
Warn
Audited by Socket on Mar 29, 2026
1 alert found:
SecuritySecurityreferences/api.md
MEDIUMSecurityMEDIUM
references/api.md
This fragment is API documentation for a remote execution and filesystem/proxy control service. It describes multiple high-impact sinks (shell command execution, interactive PTY sessions, Jupyter kernel execution, arbitrary file write/replace/delete, server-side URL fetching, and a localhost reverse proxy). If authorization is bypassable or misconfigured, it enables full system compromise and strong internal reconnaissance/SSRF. There is no concrete evidence of malware/stealth mechanisms in the provided text (no obfuscation, no exfiltration domains, no persistence code shown), but the exposed capabilities themselves represent an extremely high security risk for a supply-chain dependency.
Confidence: 45%Severity: 85%
Audit Metadata