notion-reader

Fail

Audited by Socket on Mar 10, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The Notion Reader skill exhibits coherent purpose-capability alignment and a reasonable data flow for reading Notion pages with a user-provided token. Its trust posture hinges on the local handling of a sensitive token (token_v2) and the use of an unofficial internal API, which elevates risk due to potential API changes and credential exposure in config files/logs. It is best classified as SUSPICIOUS-to-MEDIUM risk: credential handling and non-official API usage raise concerns, but there is no explicit exfiltration or remote deployment observed. Recommend adding explicit encryption for stored tokens, clear logs/outputs sanitization, an option to disable local token storage, and a migration plan to the official Notion API with OAuth where feasible.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 10, 2026, 01:16 AM
Package URL
pkg:socket/skills-sh/clementwalter%2Fclaudine%2Fnotion-reader%2F@5d8f0e785440915a2d2b8df01ad7095a7c974b9a