spclib
Warn
Audited by Socket on Apr 14, 2026
1 alert found:
SecuritySecurityreferences/example/freestanding/jit.c
MEDIUMSecurityMEDIUM
references/example/freestanding/jit.c
No explicit malicious payload behavior (no networking/filesystem/credential theft) is present in this file, but the module is intrinsically high-risk: it implements an input-driven JIT that generates raw x86-64 instructions and executes them from RWX-mapped memory. In a supply-chain/security review, treat this as a potentially dangerous execution primitive if `compile()` can be influenced by untrusted input beyond the limited arithmetic DSL.
Confidence: 65%Severity: 74%
Audit Metadata