Braintree Automation
Audited by Socket on Feb 16, 2026
1 alert found:
Obfuscated FileNo direct malware or obfuscated executable code is present in this artifact; it is a documentation/manifest describing a payment automation skill. The dominant risk is architectural: the skill routes payment operations and API credentials through a third-party MCP (Rube/Composio), creating a significant trust surface where credentials and PII may be stored, logged, or exfiltrated. Before using this skill in production, obtain and verify the MCP's security posture: credential storage and rotation policies, encryption guarantees, access controls, logging/retention practices, and independent audits. Use scoped credentials (least privilege), short-lived tokens if supported, and instrument monitoring/alerting for unexpected activity.