unifi-api
Warn
Audited by Socket on Mar 11, 2026
1 alert found:
SecuritySecurity.claude/settings.local.json
MEDIUMSecurityMEDIUM
.claude/settings.local.json
The manifest itself is not an active malware payload but is overly permissive and enables several high-risk behaviors (arbitrary shell execution and dynamic package installation). It significantly increases supply-chain and remote-code-execution attack surface if downstream code or inputs are untrusted. Tighten permissions (remove pip3 wildcard, restrict Bash args, and narrow WebFetch domains) and enforce validation and sandboxing before allowing these operations.
Confidence: 80%Severity: 75%
Audit Metadata