odt

Fail

Audited by Socket on Feb 16, 2026

2 alerts found:

AnomalyObfuscated File
AnomalyLOW
odf/scripts/annotation_smoke_test.py

The fragment is not intrinsically malicious but is a high-risk execution sink: it unconditionally executes an external script file via runpy.run_path. The security impact depends on whether the target file (or its path) can be tampered with. Recommend auditing the target file, ensuring strict filesystem permissions, using integrity checks, or avoiding this execution pattern to reduce supply-chain/local-tamper attack surface.

Confidence: 75%Severity: 60%
Obfuscated FileHIGH
odf/scripts/fetch_schemas.py

The snippet is not overtly malicious by itself, but it performs an unconditional, high-impact operation: executing a repository-local script via runpy.run_path. This yields arbitrary code execution depending entirely on the integrity and contents of scripts/fetch_odf_schemas.py. Treat this as a supply-chain/taint risk: review and verify the referenced script and the packaging/distribution process before trusting the package.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:04 PM
Package URL
pkg:socket/skills-sh/sungkhum%2Fagent-skills%2Fodt%2F@8612607df00359913e3cd924462846e4511f9d9e