stock-portfolio
Audited by Socket on Feb 28, 2026
1 alert found:
Obfuscated FileThe manifest describes a locally-run portfolio management CLI that reasonably needs read/write access to workspace CSV/JSON files and to execute a local Python script. The declared functionality aligns with this purpose. Primary risks stem from (1) absence of the referenced implementation (run_portfolio.py) which prevents auditing of network calls, secrets handling, or malicious logic, and (2) the overly broad 'python3 *' tool permission which would let an agent run arbitrary Python code. No explicit malware indicators are visible in the manifest, but the supply-chain and host-execution risk is moderate until run_portfolio.py and its dependencies are inspected. Recommendations: obtain and audit run_portfolio.py and all imported libraries, restrict agent tooling to invoke only the specific script path (not wildcard python3), avoid absolute user-home paths or parameterize runtime path, and verify any external API endpoints and credential handling (store secrets in secure storage, avoid embedding credentials in code).