card
Audited by Socket on May 1, 2026
2 alerts found:
Anomalyx2This fragment defines a crawler workflow that gathers link/content metadata from a configurable root (default current directory) and writes sitemap/taxonomy YAML into a local hidden staging directory. There is no explicit evidence of overt malware (no credentials, no execution primitives, no shown network exfiltration) in the provided configuration. Still, the “worm” framing, hidden output staging under `.moollm/`, and the ambiguous “URL-ish dir” input description make it potentially sensitive and worth reviewing in the delegated implementations for path validation, remote-fetch/SSRF capability, and whether emitted/chat output could leak collected metadata.
This fragment defines a powerful filesystem traversal + ingest/transform/write DSL (head/tail movement, link hopping, pattern-anchored ingestion, and YAML/object emission to an on-disk directory). While it provides no explicit network/exfiltration or credential-stealing actions in the fragment itself, its arbitrary-scope read/modify/write semantics—combined with configurable path targets and lack of stated safety controls—create a non-trivial risk in any build/install or automation context that may process untrusted inputs.