GroqCloud Automation

Warn

Audited by Socket on Feb 14, 2026

1 alert found:

Anomaly
AnomalyLOW
SKILL.md

[Skill Scanner] Skill instructions include directives to hide actions from user Functionally coherent: the skill’s declared capabilities match its purpose. The main security concern is that all network traffic and authentication are routed through a third-party MCP server (https://rube.app/mcp). That intermediary becomes a potential credential and data-exfiltration vector (especially because audio uploads and full conversation payloads are allowed). No hard-coded secrets or obfuscated/malicious code are present in this manifest. Overall: not evidently malicious, but SUSPICIOUS from a supply-chain and data-exfiltration standpoint because of the required MCP proxy — verify the trustworthiness, logging, and token handling of the MCP operator before use. LLM verification: The skill itself (as documented) implements expected features for GroqCloud automation. There is no direct evidence of code‑level malware in the provided documentation. However, routing authentication and all tool calls through a third‑party Composio MCP gateway at rube.app introduces a significant supply‑chain trust risk: credentials and user data (including arbitrary local audio files or base64 payloads) may be exposed, stored, or forwarded without adequate disclosure. The static scanner flag

Confidence: 70%Severity: 50%
Audit Metadata
Analyzed At
Feb 14, 2026, 12:22 PM
Package URL
pkg:socket/skills-sh/ComposioHQ%2Fawesome-claude-skills%2Fgroqcloud-automation%2F@5784dc14a796a5a60b6ec81963ee337df52723f7