pd-shared
Audited by Socket on Mar 12, 2026
1 alert found:
AnomalyThe skill provides a legitimate pattern for centralized authenticated API access via a proxy, with explicit environment-based credentials and a broad claim of support for 2,000+ apps. However, the footprint introduces credential-forwarding and data-path risks: credentials are injected into upstream requests, base64 URL encoding is used for proxy routing, and tokens/account IDs traverse several layers (env, proxy, upstream). While this aligns with a shared-auth proxy objective, the combination of environment-based secrets, automated token handling, and proxy-injected credentials constitutes non-trivial data-flow exposure and surface area for credential misuse if logs, intermediaries, or misconfigurations are not tightly controlled. Overall risk is MEDIUM to HIGH for security-conscious deployments, depending on how tightly scopes, logging, and access controls are enforced in practice.