imessage-query

Warn

Audited by Socket on May 14, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/decode_attributed_body.py

No clear indicators of direct malware behavior (e.g., network exfiltration, shell execution, persistence, credential theft) are present in the provided fragment. The dominant security concern is privacy/data-sensitivity and potential misuse: it targets a highly sensitive local Apple Messages database (chat.db), decodes attributed message bodies, and exports message content and metadata to disk. A secondary supply-chain risk exists via optional typedstream deserialization of untrusted attributedBody bytes. The snippet also contains unusual/corrupted-looking SQL/docstring interleaving, lowering confidence in exact runtime behavior without the complete file.

Confidence: 64%Severity: 60%
Audit Metadata
Analyzed At
May 14, 2026, 08:25 AM
Package URL
pkg:socket/skills-sh/terrylica%2Fcc-skills%2Fimessage-query%2F@c38712ba0225fa49ef9884d7adc4beec7a8ba40d