mapping-webapp
Audited by Socket on May 7, 2026
2 alerts found:
Anomalyx2No clear malware or stealth behavior is evident. The module is primarily an LLM-calling component that reads local screenshots and repository map excerpts and then transmits them—along with page/a11y context—to an external Anthropic-compatible API over HTTPS, using an API key in request headers. The main supply-chain/control risk is runtime sys.path manipulation to import a local module named "credentials" from a fixed directory; if that directory is compromised, it could enable import-time code execution and credential interception. Separately, the snippet contains apparent correctness issues (incomplete DESCRIBE_PROMPT assignment and an incorrect return variable in describe_all_pages) that should be fixed, but they are not direct malware signals.
No clear malware/backdoor behavior is present in this module (no execution of external commands or obfuscated payloads). However, it performs security-relevant actions: it harvests local repository source/_MAP.md content and sends it to an external LLM API along with an API key, creating a meaningful data-exfiltration/privacy risk. Additionally, it dynamically imports a credentials module after mutating sys.path from a fixed local directory, which increases supply-chain/tampering risk if that directory can be altered. Treat as a code/content disclosure component requiring strict trust controls and data classification safeguards.