tenzir-docs

Warn

Audited by Socket on May 7, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
reference/operators/api.md

The code fragment describes a straightforward REST API caller operator with user-supplied endpoint and optional body. There is no evidence of malware or backdoors within the fragment itself. Primary risk arises from how endpoints are restricted and how payloads are validated and authenticated in deployment. Recommend implementing endpoint whitelisting, input validation/escaping, and built-in authentication support in the operator to mitigate misuse when configured to reach internal or sensitive services.

Confidence: 75%Severity: 60%
AnomalyLOW
reference/functions/community_id.md

The code fragment describes a standard utility function for computing Community IDs for network flows. No malicious behavior, no hardcoded secrets, and no anomalous network activity are evident. It is a low-risk component intended for correlation in security tooling. Verification should focus on the actual implementation to ensure proper hashing, correct handling of ports per spec, and secure seed handling.

Confidence: 75%Severity: 50%
Audit Metadata
Analyzed At
May 7, 2026, 09:34 AM
Package URL
pkg:socket/skills-sh/tenzir%2Fskills%2Ftenzir-docs%2F@1c02c45064e98eea29e613b0e3f3c856e3d6c2ac