cad-explorer

Warn

Audited by Socket on May 13, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/explorer/lib/urdf/moveit2ServerClient.js

No strong indicators of intentional malware/backdoor behavior are present in this fragment (no code execution primitives, no persistence, no direct secret theft). The primary risk is configuration-abuse: when enabled, the WebSocket destination can be overridden by a user-controlled query parameter and the default enablement may activate outside intended dev-only contexts. Remote responses are lightly validated and directly resolve/reject caller Promises, so a redirected endpoint could manipulate application behavior by controlling results/errors. Overall: moderate security risk concentrated on network redirection and integrity of returned data; low direct malware likelihood.

Confidence: 66%Severity: 60%
Audit Metadata
Analyzed At
May 13, 2026, 02:17 PM
Package URL
pkg:socket/skills-sh/earthtojake%2Ftext-to-cad%2Fcad-explorer%2F@2ac2a9ca09e43e18d5086ea0cd0d445af34dc189