rmwt

Fail

Audited by Socket on Mar 14, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
scripts/dissolve_groups.py

This script is an orchestration utility that locates a local 'handoff' skill directory, injects it into sys.path, imports credential-loading and network functions, obtains a tenant token, and calls dissolve_chat for each group from user-supplied JSON. The code itself contains no obfuscated payloads or direct malicious I/O, but the design allows a serious local supply-chain or arbitrary-code-execution risk by importing from attacker-writable directories and handling credentials. Recommendations: avoid prepending untrusted directories to sys.path, validate and sandbox or cryptographically verify locally-loaded modules, validate groups_json content and allowed chat targets, and restrict credential storage/access patterns. Treat handoff modules as untrusted until audited.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 14, 2026, 02:42 AM
Package URL
pkg:socket/skills-sh/verneagent%2Ftiny-skills%2Frmwt%2F@a838db18c8b2178dd8f5e2d07e00c8bb75a90bfe