prowler-api
Audited by Socket on Mar 28, 2026
1 alert found:
SecurityNo explicit malware behaviors like network exfiltration, credential harvesting, cryptomining, or system command execution are present in this snippet. However, there are significant supply-chain/sabotage-style security risks: (1) send_task_bad dynamically dispatches Celery tasks using a user-provided task name (possible arbitrary task execution if reachable), (2) create_bad assigns tenant_id from untrusted request.data (cross-tenant boundary bypass), and (3) dangerous_function queries using an "admin" database connection (suggesting tenant isolation bypass). These should be treated as high-priority security review findings, even though direct malicious intent cannot be proven from the fragment alone.