trading
Audited by Socket on Feb 26, 2026
2 alerts found:
SecurityAnomalyThis launcher is a high-risk pattern (exec of local file + sys.path prepend). The fragment itself contains no explicit payloads, but it provides an easy execution vector for malicious code if the referenced file or package directory is tampered with. Treat as security-sensitive: audit the target file, avoid this pattern or add integrity checks, and ensure deployment directories are protected.
The script itself is not overtly malicious (no clear exfiltration, reverse shell, or credential harvesting). However it is a high supply-chain risk: it fetches and executes code from PyPI and a GitHub repo without integrity checks, runs arbitrary build/install scripts (including build.sh and setup.py) from /tmp, and uses aggressive install options (--break-system-packages). The mismatch in repository naming (Zvc/binary vs zvec) is suspicious and could indicate a misconfiguration or typosquatting attempt. Treat this as a potentially dangerous installer: inspect the remote package/repo contents before running, avoid --break-system-packages unless necessary, and prefer pinned, signed artifacts.