integrate-atlas-chat
Warn
Audited by Socket on May 8, 2026
1 alert found:
AnomalyAnomalycode/pyodide-runtime.ts
LOWAnomalyLOW
code/pyodide-runtime.ts
No clear indicators of overt malware (e.g., backdoor/exfiltration/mining) are present in the provided fragment. However, the module implements an inherently high-risk capability: executing caller-supplied Python code in Pyodide and updating sensitive Cognite credentials inside the interpreter via os.environ using string-interpolated values. If code or token inputs are not strictly trusted and properly escaped, this can enable code injection/abuse that gains access to the embedded access token. Recommend restricting who can call runCodeAsync/refreshToken, applying strict input validation/escaping, and minimizing secret exposure in the runtime environment.
Confidence: 60%Severity: 68%
Audit Metadata