integrate-atlas-chat

Warn

Audited by Socket on May 8, 2026

1 alert found:

Anomaly
AnomalyLOW
code/pyodide-runtime.ts

No clear indicators of overt malware (e.g., backdoor/exfiltration/mining) are present in the provided fragment. However, the module implements an inherently high-risk capability: executing caller-supplied Python code in Pyodide and updating sensitive Cognite credentials inside the interpreter via os.environ using string-interpolated values. If code or token inputs are not strictly trusted and properly escaped, this can enable code injection/abuse that gains access to the embedded access token. Recommend restricting who can call runCodeAsync/refreshToken, applying strict input validation/escaping, and minimizing secret exposure in the runtime environment.

Confidence: 60%Severity: 68%
Audit Metadata
Analyzed At
May 8, 2026, 02:58 PM
Package URL
pkg:socket/skills-sh/cognitedata%2Fbuilder-skills%2Fintegrate-atlas-chat%2F@0d15fe69600bcd6a8b70433fdec6b4216e8e50c7