solr-opensearch-migration-advisor
Audited by Socket on Apr 27, 2026
2 alerts found:
Anomalyx2No direct malware indicators are present in this shell snippet. The main security concerns are (1) runtime `source` of a relative `.env` file (can execute arbitrary shell code if that file is tampered with) and (2) propagation of sensitive AWS bearer token material into an external `promptfoo` process whose actions depend on `eval.yaml`. Symlink creation alters downstream skill loading but is not inherently malicious. Overall: more of an execution/credential-handling risk than a clear malicious payload, contingent on the integrity of `.env`, `eval.yaml`, and the environment where this runs.
No explicit malware is present in this bash wrapper fragment, but it materially increases security exposure by executing a local .env file as shell code, injecting an OAuth token into an unpinned Docker image, mounting a host directory into the container, and then executing an opaque entrypoint inside that container. The true maliciousness (e.g., exfiltration) cannot be ruled out without inspecting the container image/entrypoint.sh and the provenance/pinning of claude_image:0.0.1.