imessage-query

Warn

Audited by Socket on Apr 3, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/decode_attributed_body.py

No clear indicators of direct malware behavior (e.g., network exfiltration, shell execution, persistence, credential theft) are present in the provided fragment. The dominant security concern is privacy/data-sensitivity and potential misuse: it targets a highly sensitive local Apple Messages database (chat.db), decodes attributed message bodies, and exports message content and metadata to disk. A secondary supply-chain risk exists via optional typedstream deserialization of untrusted attributedBody bytes. The snippet also contains unusual/corrupted-looking SQL/docstring interleaving, lowering confidence in exact runtime behavior without the complete file.

Confidence: 64%Severity: 60%
Audit Metadata
Analyzed At
Apr 3, 2026, 09:11 PM
Package URL
pkg:socket/skills-sh/terrylica%2Fcc-skills%2Fimessage-query%2F@2178d025244a2e2da9ba0b35aa185e6e2c3335aa