stripe-subscription
Audited by Socket on Feb 21, 2026
1 alert found:
Malware[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] This fragment is a README/deployment guide for a Stripe subscription integration. The requested secrets (Stripe secret and publishable keys) and the installation steps are proportionate and expected for this purpose. There are no obvious malicious patterns (no external unknown download URLs, no pipe-to-shell commands, no credential-forwarding to third parties shown). Remaining risk is standard: the operator must trust the GitHub template and any npm dependencies; the actual server code (not included) should be reviewed to ensure it does not log or exfiltrate secrets and that it calls official Stripe endpoints. Recommendation: review the repository's server code and package.json before deployment to confirm no hidden data exfiltration or unsafe logging. LLM verification: Based on the provided README/instructions (no runtime source code included), there is no evidence of deliberate malicious code. The material is consistent with a legitimate Stripe subscription integration. Key risks are operational and supply-chain: destructive shell commands (rm -rf .git) in examples, piping secrets into CLI commands (can leak secrets), and advising npm install without lockfile/pinning (dependency supply-chain risk). Because no application source files were supplied, a full sec