prowler-api

Warn

Audited by Socket on Mar 28, 2026

1 alert found:

Security
SecurityMEDIUM
assets/security_patterns.py

No explicit malware behaviors like network exfiltration, credential harvesting, cryptomining, or system command execution are present in this snippet. However, there are significant supply-chain/sabotage-style security risks: (1) send_task_bad dynamically dispatches Celery tasks using a user-provided task name (possible arbitrary task execution if reachable), (2) create_bad assigns tenant_id from untrusted request.data (cross-tenant boundary bypass), and (3) dangerous_function queries using an "admin" database connection (suggesting tenant isolation bypass). These should be treated as high-priority security review findings, even though direct malicious intent cannot be proven from the fragment alone.

Confidence: 68%Severity: 70%
Audit Metadata
Analyzed At
Mar 28, 2026, 01:22 AM
Package URL
pkg:socket/skills-sh/prowler-cloud%2Fprowler%2Fprowler-api%2F@1d57a07b6bfe37d3111fb6017e51d599ab9f756b