reunion

Warn

Audited by Socket on Apr 6, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
cli.py

No direct evidence of intentional malware is present in this fragment (no eval/exec/subprocess/network/credential theft). However, it meaningfully increases security risk by (1) modifying sys.path at runtime (import-hijack exposure), (2) using a user-controlled name to build a JSON filename for open()/json.load without visible sanitization in this module (potential path traversal/arbitrary local file read if core does not constrain it), (3) accepting arbitrary user-selected filesystem paths for parsing via DataParser without visible validation/sandboxing here, and (4) printing potentially sensitive stored/persona content directly to the console. Real malware/exfiltration would require inspection of the delegated core modules (DataParser/ReunionManager/engine), but the attack surface in this CLI is non-trivial.

Confidence: 60%Severity: 60%
AnomalyLOW
SKILL.md

SUSPICIOUS: no network exfiltration or external installer is present, but the skill converts untrusted personal content into newly installed callable skills under ~/.claude/skills. That transitive installation plus prompt-injection exposure and explicit AI-identity concealment make the footprint riskier than a normal local memorial-writing workflow.

Confidence: 87%Severity: 63%
Audit Metadata
Analyzed At
Apr 6, 2026, 01:24 PM
Package URL
pkg:socket/skills-sh/yangdongchen66-boop%2Freunion-skill%2Freunion%2F@b1522fe494110942563d0c1f11f46fbf159b9980