Snowflake Automation

Fail

Audited by Socket on Feb 18, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The manifest itself is functionally aligned with its purpose and contains no obvious code-level malware indicators. The primary security risks are operational: centralizing credentials and all SQL execution through a third-party MCP (https://rube.app/mcp) creates a high-value chokepoint for credential harvesting, query/result logging, or exfiltration if the MCP is malicious or compromised. Allowing arbitrary multi-statement DDL/DML amplifies potential for destructive actions. Recommendations: only use with a trusted MCP operator; require explicit documentation of credential handling, retention, and encryption; enforce least-privilege Snowflake roles; implement auditing and approval workflows for destructive operations; prefer parameterized bindings and limit multi-statement execution where possible.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 18, 2026, 01:45 AM
Package URL
pkg:socket/skills-sh/ComposioHQ%2Fawesome-claude-skills%2Fsnowflake-automation%2F@8bc6cccc99c16589c82827bf180e6b47699cf46f