content-repurposing
Audited by Socket on Mar 9, 2026
1 alert found:
MalwareThe skill is coherently aimed at content repurposing using external generation tools, but it exhibits notable security and supply-chain risks. The primary concerns are the download-and-run installation from an unverified URL, dependence on unverifiable external binaries, potential credential handling during login, and data flows that may publish or transmit content to external services without explicit governance. The footprint is proportionate to its stated purpose only if strong trust controls are added (verifiable registry hosting, checksum/signature verification, explicit data handling policies, scope-limited credentials, and transparent data-flow diagrams). Until such controls are demonstrated, classify as SUSPICIOUS with elevated caution around credential handling and supply-chain integrity.