budge

Warn

Audited by Socket on May 10, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
references/INSTALL.md

No malicious payload is visible in the provided integration snippets themselves; they primarily load and execute an opaque third-party CDN IIFE. The main concern is supply-chain risk: the application executes remote JavaScript in its origin without shown integrity pinning/SRI, and the described behavior (MutationObserver-driven DOM interaction and hidden JSON configuration parsing) means the remote code can substantially affect the page and potentially user interaction/data exposure. Audit the fetched budge.iife.js, apply integrity/version pinning where possible, and restrict/limit activation to known-safe contexts.

Confidence: 60%Severity: 66%
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The stated purpose is coherent for UI tweaking, but the implementation relies on an unverifiable third-party browser script from budge.design as the core runtime. That remote, unpinned JS executes in the app with broad DOM visibility and no verifiable release/source trail, making the install trust and data-flow footprint disproportionate to a styling helper.

Confidence: 84%Severity: 82%
Audit Metadata
Analyzed At
May 10, 2026, 03:46 AM
Package URL
pkg:socket/skills-sh/millionco%2Fskills%2Fbudge%2F@d75d4323c3d3a2d59d89c75f0faa23e89cec1a5e