stripe-stack

Warn

Audited by Socket on Mar 18, 2026

1 alert found:

Anomaly
AnomalyLOW
workflows/implement-subscriptions.md

No signs of deliberate malware or obfuscated malicious code. However, the code contains a serious security/design issue: the checkout endpoint accepts userId/userEmail from the client and stores that value in Stripe session metadata; webhook handlers trust that metadata to assign subscriptions in the database without verifying ownership. This allows an attacker to create checkout sessions that link subscriptions to arbitrary internal users (possible account/billing hijack and data leakage to Stripe). Fix by authenticating the requester on the checkout endpoint, deriving userId from the server-side session (not client input), and mapping Stripe customers/subscriptions to internal users via server-controlled records rather than trusting metadata. Also avoid sending internal IDs to third parties if not necessary.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 18, 2026, 03:30 PM
Package URL
pkg:socket/skills-sh/scientiacapital%2Fskills%2Fstripe-stack%2F@36e8454ff8267c3e87b332b75b0894ce81f400bb