monitor-moodle

Warn

Audited by Socket on Feb 17, 2026

1 alert found:

Anomaly
AnomalyLOW
src/fetch_full_course_data.py

This script is a Moodle data-dump automation tool. It is not obfuscated and contains no clear code constructs typical of malware (no dynamic code execution, no remote shells, no hidden crypto). However it contains a hardcoded API token and disables TLS verification. Those two issues make it a significant security risk in practice: the hardcoded token is a credential exposure / supply-chain concern and disabling certificate verification enables interception. If the token is valid and the package were published or shared, it would enable unauthorized bulk access to sensitive course data. Recommend removing the hardcoded token (use environment variables or secure secret management), enable TLS verification, and limit which endpoints/data are requested or encrypt stored output.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Feb 17, 2026, 08:09 AM
Package URL
pkg:socket/skills-sh/pekka1398%2Fbrowser%2Fmonitor-moodle%2F@ec31ea723d65da3778528d66a2f4b47b2453994b