sequential-orchestration

Fail

Audited by Socket on Mar 1, 2026

2 alerts found:

Obfuscated Filex2
Obfuscated FileHIGH
scripts/dispatch_task.py

This module is a launcher that delegates work to an external 'codeagent-wrapper' binary by sending constructed prompts on stdin and parsing JSON output. The critical security concern is the untrusted external binary and the unvalidated data it returns — the Python code itself contains no direct network calls or dynamic code execution, but it provides a high-value sink (subprocess.run) that can lead to arbitrary code execution, data exfiltration, or system compromise if the wrapper is malicious or replaced. The provided snippet also contains a clear syntax anomaly and missing definitions, indicating the source may be corrupted or incomplete; verify repository integrity and the wrapper binary before use. Apply sandboxing, integrity checks, and strict output validation to mitigate supply-chain risk.

Confidence: 98%
Obfuscated FileHIGH
scripts/sequential_loop.py

The module is intended to orchestrate sequential tasks and persist state. The fragment shows no explicit malware (no direct exfiltration, reverse shells, or hard-coded credentials). However, append_progress is clearly corrupted with unrelated text, and key orchestration functions are missing — this indicates file tampering or accidental corruption, raising supply-chain and reliability concerns. The real security risk lies in the imported dispatch_task and spec_parser modules (they perform network/agent interactions) which must be audited. Restore or verify the file from trusted history and audit dependent modules before use.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 1, 2026, 08:45 PM
Package URL
pkg:socket/skills-sh/peterfile%2Fmy-common-skills%2Fsequential-orchestration%2F@b3f4bb0c179cdc223d81f38a72143c0cbcd393a5