one-drive-automation
Audited by Socket on Mar 5, 2026
1 alert found:
Obfuscated FileThe provided skill/spec is functionally legitimate for automating OneDrive via Rube MCP, but it centralizes sensitive flows (OAuth tokens, file contents, permission changes) through a third-party MCP endpoint (https://rube.app/mcp). The principal risk is supply-chain and data-exposure from trusting the MCP operator: tokens or file contents could be logged, persisted, or misused. Additional concerns include silent permission grants and dynamic schema retrieval increasing attack surface. I found no in-document code-level obfuscation or explicit malicious payloads, but the runtime trust in the MCP is the core security concern. Recommendations: do not add unvetted MCP endpoints, require explicit human confirmation for permission/granting actions, limit token scopes/lifetimes and audit token storage, and prefer direct/vetted Graph integrations or audited gateways.