maintain-plugins

Warn

Audited by Socket on Apr 3, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/plugin_bootstrap.py

No overt malicious payload is visible in this snippet, but it performs a high-impact supply-chain bootstrap workflow: it clones/pulls a remote Git repository specified at runtime and then executes a Python synchronization script. Because the remote source is neither pinned nor verified and the repo URL is configurable, a compromised upstream repository, malicious mirror, or manipulated --repo value could lead to untrusted code influencing the system during the sync phase. This warrants security hardening (pinning to known revisions, signature/hash verification, and allowlisting/validation of repo sources).

Confidence: 68%Severity: 69%
AnomalyLOW
scripts/sync_with_inventory.py

No direct indicators of classic malware (network exfiltration, credential theft, backdoors) are present in this fragment. However, the script is security-sensitive: it imports plugin_inventory after altering sys.path (risk of module shadowing), uses unvalidated inventory-derived plugin_name values in filesystem deletion paths (risk of unintended deletion if names are unexpected or attacker-controlled), and orchestrates subprocess execution of scripts/bridge_installer.py with plugin paths derived from local filesystem/inventory content. Overall, the primary risk is supply-chain/execution facilitation and destructive operations driven by untrusted inventory/scan outputs; this warrants reviewing plugin_inventory.py and scripts/bridge_installer.py for further risk controls.

Confidence: 63%Severity: 66%
Audit Metadata
Analyzed At
Apr 3, 2026, 06:09 PM
Package URL
pkg:socket/skills-sh/richfrem%2Fagent-plugins-skills%2Fmaintain-plugins%2F@b789695cdeb333975ffc8ce0195065ec432de7c8