tauri-devtools
Audited by Socket on Mar 2, 2026
2 alerts found:
SecurityAnomalyThe document describes powerful debugging/control primitives that, while intended for debugging and testing, carry significant security risk if exposed to untrusted parties or if access controls are weak. The most critical risk is ipc_execute_command which grants arbitrary backend command execution bypassing frontend safeguards; ipc_emit_event and the IPC capture/read_logs features further increase risk of unauthorized state changes and data leakage. The file itself contains no obfuscated or directly malicious code, but the described capabilities should be treated as high-privilege functionality and gated behind strict authentication/authorization, auditing, and operational safeguards before being enabled in production.
Benign to Suspicious: The fragment is coherent with a legitimate development-focused DevTools plugin for Tauri, offering backend observability via a gated debug-only build and a local gRPC bridge to a UI. The exposure of internal data to an external UI host (devtools.crabnebula.dev) is a purposeful feature for debugging; however, it warrants clear user consent and awareness about data exposure during development. No malware signals detected in this fragment, and install sources appear to be official registries. The external UI data path elevates risk slightly, but within the allowed DevTools context and with debug-only gating, it remains an acceptable risk for its intended use. If used in production or with sensitive data, ensure proper access controls and local-only UI deployment.