microsoft-agent-framework

Fail

Audited by Socket on Mar 13, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
reference/04-tools-functions.md

This fragment is instructional documentation demonstrating agent tool patterns, but includes multiple insecure example patterns that, if copied verbatim into production, would enable severe vulnerabilities: arbitrary code execution (eval/exec), shell command injection (subprocess.run shell=True), SQL injection (raw SQL exec), arbitrary filesystem access/deletion, and data exfiltration via network clients. I found no explicit obfuscated backdoor or purposely malicious payload in the text, but the examples promote dangerous primitives without concrete safe implementations. Treat these examples as potentially dangerous templates: require strict input validation, parameterized DB queries, avoid shell=True, implement and verify strong sandboxing, enforce authorization/approval, and apply least privilege and audit logging before reuse.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 13, 2026, 11:36 PM
Package URL
pkg:socket/skills-sh/rysweet%2Famplihack%2Fmicrosoft-agent-framework%2F@3c3b1e79581bb02243095a819548e4b039380b22