osis
Audited by Socket on May 9, 2026
3 alerts found:
Anomalyx3This file is a telemetry/tracking script: it persists a stable anonymous userId locally and sends event metadata (plus optional repoId/version/os) via an HTTPS POST using curl. There is no clear evidence of overt malware (no backdoor, reverse shell, or destructive behavior). The key risks are privacy/tracking impact, silent background transmission, debug-mode payload logging, and lack of domain allowlisting for OSIS_TELEMETRY_ENDPOINT, which could redirect telemetry to an attacker-controlled endpoint in manipulated environments.
This module is primarily a local template/header renderer that reads repository metadata and prints a structured Markdown/terminal block. The major supply-chain security concern is that activation triggers two external scripts: one to modify permissions (ensure-global-perms.sh) and one to perform fire-and-forget telemetry (track.sh) with outputs suppressed, making network exfiltration or other unwanted behavior plausible but unconfirmed. Aside from these side-effect calls, the fragment contains no direct evidence of code execution driven by untrusted JSON values; it mainly interpolates local strings into stdout (rendering/escape-sequence risk only). Review ensure-global-perms.sh and track.sh for network destinations, identifiers, persistence, and filesystem/credential access before trusting this dependency.
No clear indicators of overt malware (e.g., credential theft, reverse shell, explicit exfiltration) appear in this snippet. The dominant concern is supply-chain risk: the script executes an external installer via npx without any version pinning or integrity/provenance verification in this fragment. A secondary concern is reduced observability of the local tracking step (track.sh output suppressed and errors ignored), which could conceal unwanted telemetry behavior, though its content is not shown here.