HeyGen Automation

Fail

Audited by Socket on Feb 19, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected The skill description is coherent and appropriate for a legitimate MCP-based HeyGen integration. It outlines standard toolflows, avoids embedding secrets, and manages sensitive outputs (video IDs, statuses, and shareable URLs) via trusted endpoints. No malicious behavior is evident; key security considerations center on token management, access scope, and handling of expiring shareable URLs. LLM verification: Functional design is coherent for HeyGen automation. The red flag is the undocumented third-party MCP endpoint (https://rube.app/mcp) used for authentication and API proxying — this concentrates credentials and content on an intermediary without a provided trust model. No explicit code-level malware indicators were found in the provided file, but the supply-chain/credential risk is significant unless the MCP operator is verified. Do not provide HeyGen credentials or upload sensitive content thro

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 19, 2026, 04:06 AM
Package URL
pkg:socket/skills-sh/composiohq%2Fawesome-claude-skills%2Fheygen-automation%2F@789d1d8167fd54a7ea7f3adae0080c73f082b7fe