Back to plugin
Pluginv0.13.0
Static analysis security
Package · Deterministic local checks for risky code patterns and metadata mismatches.
Scanner verdict
SuspiciousApr 27, 2026, 6:14 PM
- Summary
- Detected: suspicious.dangerous_exec, suspicious.env_credential_access, suspicious.potential_exfiltration
- Reason codes
- suspicious.dangerous_execsuspicious.env_credential_accesssuspicious.potential_exfiltration
- Engine
- v2.4.0
Evidence
criticaldist/mcp-server.js:2295
Shell command execution detected (child_process).
while ((m = re.exec(text)) !== null) {criticalsrc/tools/scaffold-browser-bridge-node.ts:191
Shell command execution detected (child_process).
`const proc = spawnSync('node', ['bin/browser-bridge.js', PLATFORM, ACTION], {\n` +criticaldist/mcp-server.js:420
Environment variable access combined with network send.
const fromEnv = (process.env[config.apiKeyEnv] ?? "").trim();
warndist/mcp-server.js:2545
File read combined with network send (possible exfiltration).
const text = await fs3.readFile(resolved, "utf8");
warnsrc/tools/diff-workflow.ts:90
File read combined with network send (possible exfiltration).
const text = await fs.readFile(resolved, "utf8");
