syncause-debugger
Audited by Socket on Feb 16, 2026
2 alerts found:
SecurityAnomalyThis pom configuration contains high-risk patterns consistent with a supply-chain attack or at minimum poor security practice: a GitHub PAT hardcoded (and split) in the POM and a build-time bytecode transformer configured to connect to an external websocket and receive configuration (apiKey, appName, projectId). These allow credential leakage, remote exfiltration of project artifacts/metadata and the potential injection of code into built artifacts. Immediate recommendations: remove hardcoded credentials (use CI secret storage or settings.xml server entries), avoid or audit the Syncause plugin source code (and its transitive dependencies), sandbox builds, vet the external websocket endpoint, and verify artifacts with signatures. Treat this as a high security risk until the plugin and remote service are fully audited.
The installation instructions present moderate-to-high supply-chain risk primarily because they instruct executing a remote shell script via curl|bash and discourage standard, auditable practices (explicitly telling users not to use git diff and to craft a patch manually). Embedding API keys into source files is insecure. The document itself does not contain executable malicious code, but the workflow it mandates is risky and could allow a malicious remote script or instrumentation to modify project files and exfiltrate data when the app runs. Recommendation: do not run curl | bash without reviewing the script contents; obtain the repository and inspect the installer and instrumentation code in a secure environment, avoid embedding secrets in source (use environment variables/secret managers), and require reproducible, git-based patches for auditing.