Workday Automation

Fail

Audited by Socket on Feb 19, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected This toolkit description enables legitimate Workday automation but depends on a third-party MCP broker (https://rube.app/mcp) to handle authentication and API calls. The file itself contains no implementation code or obvious malware; the primary risk is supply-chain/trust: the MCP can access OAuth tokens, PII, and trigger Workday business processes. Hard-coded action IDs and lack of visibility into token/log handling increase the operational risk. Treat this as a security alert requiring trust/audit of the broker before use rather than direct evidence of malware. LLM verification: The skill's declared purpose and tools are consistent with Workday automation, but it instructs users to route authentication and API calls through a third-party MCP server (https://rube.app/mcp) without documenting the trust, token handling, or exact endpoints. This creates a significant supply-chain risk: credentials and HR data could be proxied, logged, or misused by that external operator. No explicit hardcoded secrets or obfuscated code are present in the provided markdown, but the opaque d

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 19, 2026, 04:07 AM
Package URL
pkg:socket/skills-sh/composiohq%2Fawesome-claude-skills%2Fworkday-automation%2F@1b7870f19950e2a6df106e25007c76d0797a3e1e