categorizing-bsky-accounts

Warn

Audited by Socket on Apr 26, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/bluesky_analyzer.py

The visible code primarily functions as a network-driven Bluesky account analyzer and keyword extractor, with outbound requests limited to a hardcoded public API and no direct indicators of credential theft or host compromise in the shown portion. However, the fragment includes a highly suspicious pattern: extract_keywords() constructs Python source code as a string containing filesystem reads and YAKE execution logic with embedded tmp_path/stopword paths. If the generated code is executed elsewhere (likely, given the pattern), this constitutes a meaningful dynamic code execution risk. Additionally, the use of delete=False for temporary files without shown cleanup increases data-retention exposure. Because the snippet is structurally corrupted/incomplete and key functions are omitted, conclusions about actual runtime execution cannot be fully confirmed.

Confidence: 45%Severity: 62%
Audit Metadata
Analyzed At
Apr 26, 2026, 06:40 AM
Package URL
pkg:socket/skills-sh/oaustegard%2Fclaude-skills%2Fcategorizing-bsky-accounts%2F@ff60d2e0f0cb00369355695fdcf36b2cb3b11887