First Seen
Feb 18, 2026
Last Scanned
Feb 22, 2026
Findings
4
Score
76/100
Findings (4)
Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands
sudo chown Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.
Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.
Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands
sudo chmod Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.
Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.
Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands
sudo chmod Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.
Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.
Detects cron jobs or scheduled tasks that execute commands
echo "$cron_entry") | sort -u | crontab Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.
Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.