categorizing-bsky-accounts
Audited by Socket on Apr 26, 2026
1 alert found:
AnomalyThe visible code primarily functions as a network-driven Bluesky account analyzer and keyword extractor, with outbound requests limited to a hardcoded public API and no direct indicators of credential theft or host compromise in the shown portion. However, the fragment includes a highly suspicious pattern: extract_keywords() constructs Python source code as a string containing filesystem reads and YAKE execution logic with embedded tmp_path/stopword paths. If the generated code is executed elsewhere (likely, given the pattern), this constitutes a meaningful dynamic code execution risk. Additionally, the use of delete=False for temporary files without shown cleanup increases data-retention exposure. Because the snippet is structurally corrupted/incomplete and key functions are omitted, conclusions about actual runtime execution cannot be fully confirmed.