one-drive-automation

Fail

Audited by Socket on Mar 5, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The provided skill/spec is functionally legitimate for automating OneDrive via Rube MCP, but it centralizes sensitive flows (OAuth tokens, file contents, permission changes) through a third-party MCP endpoint (https://rube.app/mcp). The principal risk is supply-chain and data-exposure from trusting the MCP operator: tokens or file contents could be logged, persisted, or misused. Additional concerns include silent permission grants and dynamic schema retrieval increasing attack surface. I found no in-document code-level obfuscation or explicit malicious payloads, but the runtime trust in the MCP is the core security concern. Recommendations: do not add unvetted MCP endpoints, require explicit human confirmation for permission/granting actions, limit token scopes/lifetimes and audit token storage, and prefer direct/vetted Graph integrations or audited gateways.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 5, 2026, 08:00 AM
Package URL
pkg:socket/skills-sh/aAAaqwq%2FAGI-Super-Skills%2Fone-drive-automation%2F@1d9163b453cdd9ced5cfa3d32c9e6e57277af688