mapping-webapp

Warn

Audited by Socket on May 7, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/describe.py

No clear malware or stealth behavior is evident. The module is primarily an LLM-calling component that reads local screenshots and repository map excerpts and then transmits them—along with page/a11y context—to an external Anthropic-compatible API over HTTPS, using an API key in request headers. The main supply-chain/control risk is runtime sys.path manipulation to import a local module named "credentials" from a fixed directory; if that directory is compromised, it could enable import-time code execution and credential interception. Separately, the snippet contains apparent correctness issues (incomplete DESCRIBE_PROMPT assignment and an incorrect return variable in describe_all_pages) that should be fixed, but they are not direct malware signals.

Confidence: 66%Severity: 66%
AnomalyLOW
scripts/analyze.py

No clear malware/backdoor behavior is present in this module (no execution of external commands or obfuscated payloads). However, it performs security-relevant actions: it harvests local repository source/_MAP.md content and sends it to an external LLM API along with an API key, creating a meaningful data-exfiltration/privacy risk. Additionally, it dynamically imports a credentials module after mutating sys.path from a fixed local directory, which increases supply-chain/tampering risk if that directory can be altered. Treat as a code/content disclosure component requiring strict trust controls and data classification safeguards.

Confidence: 72%Severity: 64%
Audit Metadata
Analyzed At
May 7, 2026, 04:35 AM
Package URL
pkg:socket/skills-sh/oaustegard%2Fclaude-skills%2Fmapping-webapp%2F@fd3a8cfcdd506016d4447b57c2366ace3af4055e