spclib

Warn

Audited by Socket on Apr 14, 2026

1 alert found:

Security
SecurityMEDIUM
references/example/freestanding/jit.c

No explicit malicious payload behavior (no networking/filesystem/credential theft) is present in this file, but the module is intrinsically high-risk: it implements an input-driven JIT that generates raw x86-64 instructions and executes them from RWX-mapped memory. In a supply-chain/security review, treat this as a potentially dangerous execution primitive if `compile()` can be influenced by untrusted input beyond the limited arithmetic DSL.

Confidence: 65%Severity: 74%
Audit Metadata
Analyzed At
Apr 14, 2026, 08:59 AM
Package URL
pkg:socket/skills-sh/aresbit%2FMateBot%2Fspclib%2F@8a06c8640022a467d8bc671bbfeadfab0d2c5a1d