se-dev-script

Warn

Audited by Socket on May 9, 2026

1 alert found:

Anomaly
AnomalyLOW
Prepare.bat

No direct malicious logic (e.g., credential theft, exfiltration, backdoor, or reverse shell) is evident in this batch fragment itself. However, it performs high-risk supply-chain operations: it executes a remotely fetched installer script via PowerShell `ExecutionPolicy ByPass` + `iex`, and it downloads an external executable without integrity verification. It also creates junctions into user/game directories and then runs Python indexing/inventory scripts, so any compromise of upstream downloads or the invoked Python code would have elevated impact. This should be treated as a moderate-to-high security review item pending verification of upstream integrity (hash/signature pinning), and auditing of the invoked Python scripts.

Confidence: 64%Severity: 62%
Audit Metadata
Analyzed At
May 9, 2026, 09:14 PM
Package URL
pkg:socket/skills-sh/viktor-ferenczi%2Fse-dev-skills%2Fse-dev-script%2F@00f8f6de5070af3ae6f6fb8a7d6dec1c683e2f12