cloud-local-bridge

Warn

Audited by Socket on Mar 10, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
scripts/bridge_server.py

This module is potentially dangerous when deployed: it provides authenticated remote command execution, arbitrary file read/write, and arbitrary outbound callback capability. If the bearer token is leaked (and it's logged at startup), an attacker can execute commands, read/overwrite files, and exfiltrate data. The code itself appears to be an admin/bridge tool rather than intentionally obfuscated malware, but it is highly capable of being abused as a backdoor or for data exfiltration. Recommended actions: do not run on untrusted networks or as root; avoid logging tokens; restrict binding address; implement strict path whitelisting, remove shell=True (use list of args), validate/whitelist callback URLs, add more robust authentication/authorization and auditing, and consider removing direct file system and shell execution features or gating them behind very strict controls.

Confidence: 90%Severity: 85%
SecurityMEDIUM
references/EXAMPLES.md

The provided documentation shows a bridge design that exposes powerful and dangerous capabilities (remote arbitrary command execution and arbitrary file read/write) over HTTP protected only by a bearer token in examples. The text itself is not obfuscated and contains no explicit malicious payloads, but the described behavior is high-risk: if tokens or network access are compromised, an attacker can execute commands and exfiltrate sensitive files. Before using this in production, require TLS, scoped short-lived tokens, mutual auth, path restrictions, least privilege runtime, logging/auditing, and careful firewall rules. Review the actual bridge_server.py implementation for input validation, sandboxing, and authorization policies.

Confidence: 85%Severity: 80%
Audit Metadata
Analyzed At
Mar 10, 2026, 03:39 PM
Package URL
pkg:socket/skills-sh/openclaw%2Fskills%2Fcloud-local-bridge%2F@a1fd737136a07a7e2c9ba11f9f2113e8b29bae19