socket-setup
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the Node Version Manager (nvm) installation script from the official
nvm-shGitHub repository. - [EXTERNAL_DOWNLOADS]: Downloads the
socket-patchinstallation script from the author's (SocketDev) GitHub repository. - [EXTERNAL_DOWNLOADS]: Fetches standalone
sfwbinaries directly from the officialsocket.devdomain. - [REMOTE_CODE_EXECUTION]: Executes the downloaded
nvmandsocket-patchinstallation scripts using shell pipes (curl | bashandcurl | sh). - [COMMAND_EXECUTION]: Uses local helper scripts (
scripts/helpers/socket-setup.mjsandscripts/helpers/detect-ci.ts) to perform environment checks, project detection, and Dockerfile analysis. - [COMMAND_EXECUTION]: Instructs the agent to modify project files such as
Dockerfileandpackage.jsonto integrate security tools, requiring user approval before writing. - [CREDENTIALS_UNSAFE]: Includes a hardcoded public demo token (
sktsec_t_--RAN5U4ivauy4w37-6aoKyYPDt5ZbaT5JBVMqiwKo_api) intended for users without an account to provide immediate, limited CLI functionality. - [PROMPT_INJECTION]: Ingests project configuration data from files like
package.jsonandDockerfileto identify build steps, creating an attack surface for indirect prompt injection. - Ingestion points: Reads
package.json, CI configurations (GitHub Actions, GitLab CI),Makefile,Dockerfile, and other build-related metadata files via helper scripts. - Boundary markers: No delimiters or instructions to disregard embedded commands are present when processing the contents of these files.
- Capability inventory: The skill performs shell command execution, global package installation, and direct file modification.
- Sanitization: There is no evidence of sanitization or validation of the strings extracted from project files before they are used in generated configuration commands.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/SocketDev/socket-patch/main/install.sh, https://raw.githubusercontent.com/nvm-sh/nvm/v0.40.3/install.sh - DO NOT USE without thorough review
Audit Metadata