peaks-sdd
Audited by Socket on May 10, 2026
3 alerts found:
AnomalySecurityx2This fragment appears to be an intentionally designed offensive QA security testing agent. It contains exploit-like payloads and invokes active scanning tools (sqlmap/nmap/OWASP ZAP) and writes results to local report artifacts. There is no clear evidence of supply-chain malware (no backdoor/credential theft/exfiltration logic) in the provided content; the primary concern is operational/abuse risk if run against non-authorized or non-isolated targets, plus safety concerns from the external CSRF simulation URL and potential report/artifact leakage.
SUSPICIOUS. The stated goal is TypeScript spec-driven development, but the actual footprint is much broader: it modifies project config, installs many MCP servers, loads numerous third-party skills, and enables browser/search/fetch/docker capabilities. The main risk is disproportionate scope plus transitive and unpinned supply-chain execution, not confirmed malware.
No direct evidence of classic malware (e.g., data theft/exfiltration or persistence) exists in this snippet. However, it has a security-critical weakness: it uses execSync with a shell-interpreted command string built from unvalidated/interpolated skillUrl and skillName, creating a command-injection/sabotage vector if inputs are attacker-controlled. Separately, it increases supply-chain risk by running npx-based installations without integrity/version pinning. Overall, this module should be treated as high-risk in environments where skillUrl/skillName can be influenced by an attacker or where execution integrity is not strictly controlled.