specmatic-openapi-spec-extractor
Warn
Audited by Socket on May 5, 2026
1 alert found:
SecuritySecuritycontent/templates/run_contract_tests.sh
MEDIUMSecurityMEDIUM
content/templates/run_contract_tests.sh
No clear malicious payload is evident in the provided script fragment (no explicit data theft/exfiltration/backdoor logic). However, the script contains several high-impact risk patterns: direct host-side execution of environment-provided command strings (eval of PRE_TEST_SETUP_CMD and bash -lc of SUT_START_CMD), environment-controlled outbound HTTP requests for health checking (SUT_HEALTHCHECK_URL), and mutable container execution/pull behavior (falls back to specmatic/enterprise:latest and can run an attacker-chosen local image via SPECMATIC_DOCKER_IMAGE). If environment variables or image sources are not tightly controlled, this becomes a significant command execution and runner egress risk.
Confidence: 70%Severity: 72%
Audit Metadata