pet-rate-rings
Audited by Socket on May 5, 2026
2 alerts found:
AnomalySecurityNo explicit malware behavior is demonstrated in this fragment (no network/exfiltration/destructive actions or secrets are visible). However, the script is fundamentally a code-execution/verification harness that runs arbitrary project-supplied code (npm test and a Node script) and conditionally performs arbitrary shell execution via source of a file within TARGET_DIR. If TARGET_DIR can be influenced by an attacker, this creates a meaningful supply-chain execution risk. If TARGET_DIR is strictly controlled/trusted, the risk is reduced to functional validation behavior.
No direct malicious payload (e.g., exfiltration, credential access, or obfuscated execution) is evident in this fragment. The primary security concern is supply-chain/persistence impact: it installs a persistent LaunchAgent that repeatedly runs `npm start` from the app directory using PATH-resolved binaries and externally sourced configuration (`LABEL`). This creates a high-impact execution pathway if upstream scripts/dependencies or the helper module are tampered with. Review `scripts/lib/launch-agent.sh` and the app’s npm `start` script and dependency integrity before trusting this behavior.