interactive-shell

Warn

Audited by Socket on Feb 27, 2026

1 alert found:

Anomaly
AnomalyLOW
config.ts

The fragment appears to implement a standard configuration loader with validation, merging defaults with user/global/project overrides. However, there are clear anomalies: a malformed DEFAULT_CONFIG block (an 'as const,' line) and multiple trailing commas in function calls. These syntax issues would cause runtime/compile-time errors or could be indicative of tampering or obfuscation. Functionality itself (reading config, merging, clamping) is not inherently malicious, but the anomalies create a threat surface: if the file is modified to be syntactically valid, it would still read external config and could be exploited if an attacker places crafted config files. Overall, low to medium risk from a security perspective given the current visible code, but high likelihood of broken behavior or potential backdoors if altered. Address the syntax issues before deployment to avoid runtime failures or exploitation through misconfiguration.

Confidence: 59%Severity: 55%
Audit Metadata
Analyzed At
Feb 27, 2026, 04:36 AM
Package URL
pkg:socket/skills-sh/nicobailon%2Fpi-interactive-shell%2Finteractive-shell%2F@aeaed475b85a590ef8e8e2ef9b4eea49f54f93fe