reddit-automation

Fail

Audited by Socket on Mar 5, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

Functional design is coherent for Reddit automation, but the security posture depends on trust in the external MCP (https://rube.app/mcp). The artifact implements a credential‑forwarding pattern: OAuth and all Reddit API interactions are brokered by MCP which concentrates tokens and user activity with the MCP operator. This raises a moderate security risk (potential for token harvesting, data access, or unauthorized actions) unless the MCP is audited and policies are transparent. There is no evidence of embedded malware or obfuscated malicious code in the provided artifact itself, but the supply‑chain/trust risk of the external MCP is the primary concern. Recommendations: (1) avoid or minimize use of third‑party MCPs for OAuth unless operator is vetted; (2) prefer direct OAuth with minimal scopes or ensure MCP provides explicit, auditable token handling and retention policies; (3) require per‑action confirmations for destructive operations and implement rate‑limit/backoff and logging controls.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 5, 2026, 08:02 AM
Package URL
pkg:socket/skills-sh/aAAaqwq%2FAGI-Super-Skills%2Freddit-automation%2F@632ff7a8df0cec91e985acae7a0d0c8b4a082a54