pair-programmer
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyThis code is not obfuscated and contains no clear signs of traditional malware (no eval, no reverse shells, no command execution). However, it intentionally captures screen, system audio and microphone and uploads media and indexing data to a remote VideoDB service using an API key. That makes it privacy-invasive and potentially dangerous if the API key is compromised or if users install/run the app without understanding that their screen/audio will be sent to a third-party. Additional concerns: writing session/events to predictable /tmp files (possible local disclosure) and loading .env/pp.config.json from a user-specified directory. Recommend careful review of the VideoDB service, securing the API key, and protecting the local temp files; otherwise the package should be treated as high privacy risk but not clearly malware.