agent-notifier
Audited by Socket on Mar 27, 2026
3 alerts found:
Anomalyx3This code is best characterized as a configurable agent/event notification dispatcher. It does not show strong indicators of malware in the module itself (no backdoor/persistence/reverse shell). The primary security concern is intentional outbound transmission of untrusted event content (and local project context) to external third parties using destinations/credentials loaded from a local config. A secondary concern is the AppleScript (-e) injection risk due to minimal escaping when embedding event-derived text into the osascript command.
No clear evidence of overt malware (e.g., credential theft, persistence, or network exfiltration) is present in this fragment. However, the dependency executes an external shell pipeline and runs a local Python script from a hardcoded home-directory path. This makes the component higher-risk than a pure in-process notifier, and it warrants reviewing (1) the $ tagged-template implementation for proper escaping and (2) the contents/behavior of notify.py for any outbound communication or data handling.
This code is primarily a setup/installer that collects notification credentials (Telegram/SMTP/Slack/Discord), stores them in plaintext JSON, and installs cross-platform hooks/plugins so that a local `notify.py` script will be executed automatically by developer tooling. There is no direct evidence of malware/exfiltration in this snippet alone (no network calls, no obfuscation, no shell=True). The security risk is driven by sensitive secret persistence and the high-impact automatic execution pathway into an unseen `notify.py` (and copied OpenCode plugin), which must be reviewed to fully assess malicious intent.