webf-native-plugins
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] BENIGN. The fragment is a coherent and proportionate documentation piece describing the setup and usage of WebF native plugins across Flutter and web environments. There are no suspicious commands, credential flows, or data exfiltration patterns. Recommended to verify actual plugin sources before use, but the documented flow aligns with standard plugin bridging patterns between Flutter and JavaScript. LLM verification: The file is a legitimate documentation/installation guide for WebF native plugins and contains no executable plugin implementation in the provided fragment. Primary risks are supply-chain (unpinned npm/Flutter installs), potential presence of a destructive shell command snippet flagged by static analysis (needs immediate review), and broad native privileges requested by plugins which can expose sensitive data. There is low direct evidence of malware or obfuscation in this document, but downstrea