spot-companies-using-specific-tech-stack

Warn

Audited by Socket on Apr 17, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
api.sh

No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.

Confidence: 68%Severity: 56%
AnomalyLOW
signup.sh

This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.

Confidence: 72%Severity: 56%
Audit Metadata
Analyzed At
Apr 17, 2026, 06:13 PM
Package URL
pkg:socket/skills-sh/openfunnel%2Fopenfunnel-skills%2Fspot-companies-using-specific-tech-stack%2F@9adf39de36b2c42996ac12ae0036d8a4dea27e55