Alert type docs
Internal scanner documentation for AlertType.
README
Alert type docs (AlertType)
This directory is the canonical documentation for the scanner’s internal AlertType values.
Note: When you add/remove an alert type (source of truth:
enum AlertTypeinprisma/schema.prisma), you must also:
- add/remove a markdown page in this folder
- update the index below
These markdown files are also rendered in the web app at
/docs/alerts.
If you’re looking for Socket.dev’s full catalog (external reference, not our internal enum), see docs/SOCKET_ALERT_TYPES.md.
Index
installScripts: npm lifecycle scripts that run during install/uninstallnetworkAccess: code that can make network requests (potential exfiltration)typosquat: package name similarity suggesting a typo-squatobfuscation: packed/high-entropy/obfuscated codeshellExecution: use of shell / process execution APIsenvAccess: access to environment variables (often secrets)evalUsage: dynamic code execution viaeval/Functionbase64Secrets: base64 strings consistent with secrets/payloadscryptoMining: mining/pool indicators and miner-like codesensitiveFileAccess: reads/writes of sensitive paths (SSH keys, cloud creds, etc.)dangerousApi: risky Node/browser APIs commonly abused by malwarec2Communication: command-and-control indicators (suspicious hosts/URLs)gitDependency: dependency that resolves to a git/GitHub URL or shorthandhttpDependency: dependency that resolves to a remote HTTP(S) URLtelemetry: telemetry/analytics behaviorshrinkwrap: presence ofnpm-shrinkwrap.json/ lockfile patternstrivialPackage: extremely small/trivial packages (higher risk surface)hasNativeCode: native/compiled artifacts (harder to audit)manifestConfusion: registry manifest differs from tarball contentsllmFlagged: LLM-based analysis flagged suspicious intentdependencyConfusion: private/public package name collision riskrepojacking: maintainer/repo takeover risk signalscustomNovel: novel heuristics not covered by a dedicated alert type