imessage-query
Warn
Audited by Socket on Apr 3, 2026
1 alert found:
AnomalyAnomalyscripts/decode_attributed_body.py
LOWAnomalyLOW
scripts/decode_attributed_body.py
No clear indicators of direct malware behavior (e.g., network exfiltration, shell execution, persistence, credential theft) are present in the provided fragment. The dominant security concern is privacy/data-sensitivity and potential misuse: it targets a highly sensitive local Apple Messages database (chat.db), decodes attributed message bodies, and exports message content and metadata to disk. A secondary supply-chain risk exists via optional typedstream deserialization of untrusted attributedBody bytes. The snippet also contains unusual/corrupted-looking SQL/docstring interleaving, lowering confidence in exact runtime behavior without the complete file.
Confidence: 64%Severity: 60%
Audit Metadata