app-store-screenshots
Audited by Socket on Mar 8, 2026
1 alert found:
MalwareOverall, the skill appears aligned with its stated purpose of generating app store screenshots and previews but relies on a non-official, download-and-execute distribution model for its core CLI. This introduces notable supply-chain and credential-flow risks due to remote binary installation, potential credential prompts, and data flowing through an external tool. While the media generation capability itself is legitimate for ASO tasks, the installation/source provenance and data handling are not transparently verifiable. Given the footprint, this skill should be treated as SUSPICIOUS with a need for stronger provenance, verifiable checksums from official registries, and explicit data-flow disclosures (where inputs and outputs are stored, processed, and transmitted). If a legitimate vendor provides a signed, pinned binary from an official registry with transparent data handling and user-consent prompts, the risk posture would improve toward BENIGN.