phase-contract-workflow
Warn
Audited by Socket on May 11, 2026
1 alert found:
SecuritySecurityscripts/planctl.rb
MEDIUMSecurityMEDIUM
scripts/planctl.rb
No explicit malware/backdoor behavior (e.g., hidden networking or credential theft) is evident in this Ruby module. However, it contains a high-impact supply-chain execution gadget: it runs arbitrary shell commands taken from YAML-defined phase checks via `Open3.popen2e('sh','-lc', command, ...)` and can then write ledgers and (optionally) commit/push changes via git. Use of this tool is therefore only safe when plan/manifest.yaml (and the phase check command definitions) are fully trusted and protected; otherwise an attacker can achieve arbitrary code execution with significant persistence/blast radius.
Confidence: 74%Severity: 80%
Audit Metadata