ralph
Audited by Socket on Mar 7, 2026
1 alert found:
SecurityThe script contains no direct obfuscated malware, hardcoded secrets, or obvious destructive commands. However, it intentionally delegates file modifications and git commits to an external AI binary invoked with a flag that suggests bypassing normal permission/safety checks. That delegation creates a significant supply-chain risk: the external agent could modify files arbitrarily, commit secrets, exfiltrate data, or run commands if it has tool integrations. If you do not fully trust the 'claude' binary (or its upstream service), do not run this script in repositories containing secrets or on production branches. Prefer explicit local execution of typechecks and manual review of changes instead of granting an external agent commit privileges. Overall: low probability of embedded malware in this script itself, but moderate-to-high operational risk due to the external agent invocation and the --dangerously-skip-permissions flag.