box-automation

Fail

Audited by Socket on Feb 20, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [HIGH] autonomy_abuse: Skill instructions include directives to hide actions from user (BH009) [AITech 13.3] The fragment is a benign, well-structured documentation artifact describing Box automation workflows via a standard MCP toolchain. It does not contain executable code, credentials, or data-exfiltration logic. To improve security posture in practice, ensure host applications implement token securely (encrypted at rest, in transit with TLS), enforce least-privilege OAuth scopes, validate inputs, and audit tool usage to prevent over-permission access. LLM verification: This skill's stated purpose matches the capabilities described and is plausible for a Box automation skill. The main security concern is that all toolkit operations and OAuth appear to be routed through a third-party managed control plane (Rube MCP / Composio). That creates a trust and data-exfiltration risk: OAuth tokens, file contents, metadata, and sharing operations could be observed or controlled by the MCP operator. There are no direct signs of obfuscated or intentionally malicious code in

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 20, 2026, 08:20 AM
Package URL
pkg:socket/skills-sh/davepoon%2Fbuildwithclaude%2Fbox-automation%2F@2ccd2e99e2f29e29fad3a1cbf30cb0414f4eea02