etermin-automation
Audited by Socket on Feb 16, 2026
1 alert found:
Obfuscated FileNo direct malicious code or obfuscation is present in the provided specification. The dominant concern is a supply-chain/trust risk: the skill centralizes authentication and execution through a third-party MCP (rube.app/mcp) without describing token lifecycle, storage, auditability, or least-privilege controls. If the MCP is trustworthy and operates with strong security, this is a manageable integration pattern; if not, it enables credential harvesting, replay of tokens, and potentially harmful bulk operations in Etermin. Recommend: treat the MCP as a high-trust dependency, audit the MCP's security/privacy/retention policies, prefer scoped/ephemeral credentials, require explicit least-privilege scopes for toolkit actions, and log/audit all broker-mediated operations before adoption.