happy-app-audit
Audited by Socket on Apr 20, 2026
3 alerts found:
Anomalyx2SecurityThis fragment behaves like a local inventory/forensics utility: it enumerates user-scoped application data directories and can extract SQLite schema text from discovered databases into a caller-specified Markdown report. There is no direct evidence of malware, remote exfiltration, or stealth behavior in the shown code. The main security concerns are privacy/data exposure (file paths/sizes and database schema) and the use of an external command (sqlite3) through a custom run(...) helper whose implementation is not shown, plus lack of validation for the output path.
This module is primarily a local orchestrator and does not show direct malicious behavior (no networking, exfiltration, or obvious credential theft) in the visible code. However, it can execute a locally provided/discovered script for image generation (via BAOYU_IMAGINE_SCRIPT and user-home paths) and it runs multiple helper scripts with inherited stdio. If an attacker can influence the environment variable, the home-directory script locations, or any of the spawned helper scripts, the wrapper can be leveraged for local arbitrary code execution in the user’s context. Security depends heavily on trust/supply-chain integrity of the helper scripts and on whether BAOYU_IMAGINE_SCRIPT/script discovery is constrained to trusted locations.
The described patterns indicate invasive telemetry and data-exfiltration behavior with significant privacy and supply-chain risk. While presented as audit fragments rather than verified code, the combination of cross-app tracking, sensitive keystroke/context data, insecure cryptography practice, and persistent external communications warrants careful review, consent checks, data minimization, and explicit governance before inclusion in any public or distributed library. The overall risk profile is high for privacy impact and potential misuse in a software supply chain.