aws-iot-greengrass

Fail

Audited by Socket on Mar 10, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
references/setup/setup-greengrass-container.md

This is an operational deployment guide that prescribes insecure configurations: running containers as root, using --privileged, and mounting host AWS credentials into the container. While not explicitly malicious, these instructions create a high-risk environment for supply-chain or runtime compromise: a malicious or compromised Greengrass artifact, pip package, or component could obtain host-level access and full AWS account access. Recommended remediations: validate and verify downloaded artifacts (signatures/checksums), avoid --privileged where possible, run processes as non-root (use capabilities only as required), use short-lived IAM credentials or instance roles scoped to minimal permissions (do not mount host root credentials), pin package versions and install from trusted internal registries, and enable monitoring/alerting for unexpected network or AWS API usage.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 10, 2026, 04:28 PM
Package URL
pkg:socket/skills-sh/aws-greengrass%2Fgreengrass-agent-context-pack%2Faws-iot-greengrass%2F@dc2fa025dcca6f0acc6449be9cf4c4a53869c305