This module implements a bidirectional bridge between network sockets and a local process, enabling interactive remote control (remote shell) when exec is provided. It is high-risk: subprocess creation uses shell=True and network input is forwarded directly to subprocess stdin with no authentication, authorization, encryption, or sanitization. In a trusted, well-controlled environment (local-only testing, isolated VM) it can be useful; in general production or untrusted-network deployments it should be considered dangerous and not used without adding robust authentication, encryption (TLS), input validation, and avoiding shell=True (use list args). Recommendation: do not run exposed to untrusted networks; change subprocess invocation to avoid shell=True, add authentication and TLS, and restrict/validate exec strings and network sources.
Live on pypi for 2 hours before removal. Socket users were protected even while the package was live.