openrouter-images
Audited by Socket on Mar 9, 2026
3 alerts found:
Anomalyx2Obfuscated FileThe fragment installs hidden signal listeners and mutates Node.js process listener inspection APIs to conceal them, then optionally forwards signals to an external client in the main thread. This creates a covert channel for signal handling and potential remote control or data leakage, depending on the trustworthiness of the external client. While not inherently malicious, the hidden nature and external forwarding pose non-trivial security risks and warrant careful review in the context of the hosting project.
The code implements a sophisticated TypeScript/JavaScript module loader with tsconfig-aware resolution and on-the-fly compilation. While it customizes module resolution, transforms code, and can alter how modules are loaded and cached, there is no concrete evidence of malicious behavior within this fragment (no hardcoded secrets, no data exfiltration, and no obviously malicious external communication). The primary risk lies in its capability to hijack module resolution and execute transformed code, which could be abused if this loader is compromised or if inputs are tainted. Overall security risk is medium due to runtime code transformation and dynamic execution potential, but malware probability remains low based on the provided fragment.
The skill's footprint is coherent with its stated purpose: it generates or edits images via a legitimate external API using an API key, saves results locally, and provides metadata. Data flows involve sending prompts to the OpenRouter API and returning generated images, which is expected for an image-generation tool. The security posture is reasonable: usage of a known API, environment-based credentials, and local file outputs. No evident credential harvesting, data exfiltration beyond intended outputs, or unverified binaries are identified. Overall, the risk is low-to-moderate and consistent with a developer tooling capability for image generation/editing.