solr-opensearch-migration-advisor

Warn

Audited by Socket on Apr 27, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
tests/scripts/run_evals.sh

No direct malware indicators are present in this shell snippet. The main security concerns are (1) runtime `source` of a relative `.env` file (can execute arbitrary shell code if that file is tampered with) and (2) propagation of sensitive AWS bearer token material into an external `promptfoo` process whose actions depend on `eval.yaml`. Symlink creation alters downstream skill loading but is not inherently malicious. Overall: more of an execution/credential-handling risk than a clear malicious payload, contingent on the integrity of `.env`, `eval.yaml`, and the environment where this runs.

Confidence: 62%Severity: 56%
AnomalyLOW
setup/docker/claude/start_container.sh

No explicit malware is present in this bash wrapper fragment, but it materially increases security exposure by executing a local .env file as shell code, injecting an OAuth token into an unpinned Docker image, mounting a host directory into the container, and then executing an opaque entrypoint inside that container. The true maliciousness (e.g., exfiltration) cannot be ruled out without inspecting the container image/entrypoint.sh and the provenance/pinning of claude_image:0.0.1.

Confidence: 66%Severity: 60%
Audit Metadata
Analyzed At
Apr 27, 2026, 01:57 PM
Package URL
pkg:socket/skills-sh/opensearch-project%2Fopensearch-agent-skills%2Fsolr-opensearch-migration-advisor%2F@2fb4d2269c4f1400bef02d0884dcf606396692d9