apm-usage

Warn

Audited by Socket on May 12, 2026

1 alert found:

Anomaly
AnomalyLOW
installation.md

The fragment is installation guidance rather than package source code. The primary supply-chain risk is the “quick install” method that directly executes remotely fetched scripts (`curl ... | sh` / `irm ... | iex`) with no integrity verification shown here. While no concrete malicious logic is visible in the snippet itself, the security of the installation effectively depends on the integrity and behavior of the remote installer endpoints. Review/pin/verify the downloaded installer (e.g., checksum/signature), or prefer package-manager installation where feasible.

Confidence: 56%Severity: 63%
Audit Metadata
Analyzed At
May 12, 2026, 10:36 PM
Package URL
pkg:socket/skills-sh/microsoft%2Fapm%2Fapm-usage%2F@b199c889e7c4efdba2e7226549dcb12032d757b8