specmatic-openapi-spec-extractor

Warn

Audited by Socket on May 5, 2026

1 alert found:

Security
SecurityMEDIUM
content/templates/run_contract_tests.sh

No clear malicious payload is evident in the provided script fragment (no explicit data theft/exfiltration/backdoor logic). However, the script contains several high-impact risk patterns: direct host-side execution of environment-provided command strings (eval of PRE_TEST_SETUP_CMD and bash -lc of SUT_START_CMD), environment-controlled outbound HTTP requests for health checking (SUT_HEALTHCHECK_URL), and mutable container execution/pull behavior (falls back to specmatic/enterprise:latest and can run an attacker-chosen local image via SPECMATIC_DOCKER_IMAGE). If environment variables or image sources are not tightly controlled, this becomes a significant command execution and runner egress risk.

Confidence: 70%Severity: 72%
Audit Metadata
Analyzed At
May 5, 2026, 01:27 PM
Package URL
pkg:socket/skills-sh/specmatic%2Fskills%2Fspecmatic-openapi-spec-extractor%2F@456c22b05165ed1560baf35a2ab507edbc3cbed2