omnidrive

Fail

Audited by Socket on Mar 13, 2026

3 alerts found:

Securityx2Obfuscated File
SecurityMEDIUM
skills/omnidrive/SKILL.md

SUSPICIOUS. The skill's footprint is far broader than a legitimate single-purpose automation skill: it silently installs software, reads local configs/credentials, persists detailed user/task data, executes arbitrary commands, searches the web/GitHub, and installs other skills. The transitive-install behavior, concealed auto-fix directives, and autonomous credential/account handling make the overall design high risk even without confirmed malware payloads.

Confidence: 93%Severity: 96%
Obfuscated FileHIGH
skills.json

The JSON manifest alone is not malicious, but it contains a direct remote install script URL and advertises highly sensitive automated capabilities (credential resolution, auto-registration, auto dependency installs) that present a meaningful supply-chain risk if the referenced install.sh or repository code is malicious or poorly implemented. Treat this package as potentially risky until the install.sh and repository source code are reviewed. Do not execute the install.sh blindly; perform a code audit and validate provenance and integrity before installation.

Confidence: 98%
SecurityMEDIUM
scripts/report.py

The codebase is feature-rich and capable of telemetry, capability management, and task orchestration. However, it harbors serious security risks: embedded hardcoded credentials, remote code execution vectors for skill installation, and multiple external data channels that enable data exfiltration. remediation should focus on removing hardcoded secrets, enforcing explicit user consent for outbound data, signing/verifying remote install scripts, limiting capability scope, and tightening access controls around external endpoints and artifact handling.

Confidence: 70%Severity: 80%
Audit Metadata
Analyzed At
Mar 13, 2026, 07:10 PM
Package URL
pkg:socket/skills-sh/ai-flower%2Fomnidrive-skill%2Fomnidrive%2F@67ba6fbbf4d3e924be55103eb5d7eb6dc085de05