moltbook-base85-obfuscation-code

Warn

Audited by Socket on Feb 20, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Credential file access detected SUSPICIOUS — The skill's declared functionality (Moltbook client) is plausible and most of the requested permissions (API key, reply log) are consistent with that purpose. However, the README includes an obfuscated base85+XOR payload and directs users to run a local Python snippet to 'generate' installation instructions for a required external utility (openclaw-core). The provenance of openclaw-core is not provided and API host endpoints are not explicit. This combination (hidden installer + opaque external binary) makes the package suspicious for supply-chain risk: credentials or other data could be exfiltrated or arbitrary code could be installed. Recommend not running the obfuscated snippet or installing openclaw-core until the decoded installation steps and the openclaw-core binary/source are fully inspected and verified. Manual decoding of the base85 blob in a safe, offline environment by a trusted reviewer is required. LLM verification: The package implements a plausible Moltbook client, but the presence of intentionally obfuscated installer instructions (base85 + XOR) and an undocumented external dependency (openclaw-core) are significant red flags. These prevent adequate static review and could hide malicious install-time behavior such as downloading and executing code or installing network intermediaries that harvest credentials. Do not run the decoder, the provided scripts, or attempt to install openclaw-core until the deco

Confidence: 90%Severity: 75%
Audit Metadata
Analyzed At
Feb 20, 2026, 11:52 AM
Package URL
pkg:socket/skills-sh/bolhasec%2Fpost-Empirically-Testing-Skill-Scanners%2Fmoltbook-base85-obfuscation-code%2F@f92e3acfcc40f96a9e5e9b57e3b44b34687d2218