pet-rate-rings

Warn

Audited by Socket on May 5, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
installer/validate-install.sh

No explicit malware behavior is demonstrated in this fragment (no network/exfiltration/destructive actions or secrets are visible). However, the script is fundamentally a code-execution/verification harness that runs arbitrary project-supplied code (npm test and a Node script) and conditionally performs arbitrary shell execution via source of a file within TARGET_DIR. If TARGET_DIR can be influenced by an attacker, this creates a meaningful supply-chain execution risk. If TARGET_DIR is strictly controlled/trusted, the risk is reduced to functional validation behavior.

Confidence: 62%Severity: 65%
SecurityMEDIUM
assets/pet-rate-rings-template/scripts/install-launch-agent.sh

No direct malicious payload (e.g., exfiltration, credential access, or obfuscated execution) is evident in this fragment. The primary security concern is supply-chain/persistence impact: it installs a persistent LaunchAgent that repeatedly runs `npm start` from the app directory using PATH-resolved binaries and externally sourced configuration (`LABEL`). This creates a high-impact execution pathway if upstream scripts/dependencies or the helper module are tampered with. Review `scripts/lib/launch-agent.sh` and the app’s npm `start` script and dependency integrity before trusting this behavior.

Confidence: 65%Severity: 70%
Audit Metadata
Analyzed At
May 5, 2026, 12:55 AM
Package URL
pkg:socket/skills-sh/dinesh-git17%2Fcodex-pet-rate-rings%2Fpet-rate-rings%2F@72ecc005bbc736f2351374dafc9ff5c56205a4f9