wespy-fetcher

Fail

Audited by Socket on Mar 1, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
scripts/wespy_cli.py

This script is a convenience bootstrapper that automatically fetches and runs upstream code. Its main risk is being a supply-chain execution vector: cloning and immediately importing/executing remote code without integrity checks or isolation enables arbitrary remote code execution if the upstream repo or transport is compromised. There is no direct evidence of malicious code inside this file, but its design is unsafe for untrusted environments. Additionally, the file contains a syntax error that prevents execution until fixed. Recommendations: do not run this in production or with elevated privileges; require manual review of the cloned repository or implement pinned commits, signed releases, checksum verification; run fetched code in an isolated container/VM; and avoid using predictable writable paths or add atomic install/ownership checks.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 1, 2026, 04:29 PM
Package URL
pkg:socket/skills-sh/wlzh%2Fskills%2Fwespy-fetcher%2F@51e1e8590c1572daf22cbf4579a99e97f25bbbfa