gmail-invoice-processor
Audited by Socket on Feb 20, 2026
1 alert found:
Obfuscated FileThe package appears to implement described invoice-processing functionality without clear indicators of malicious intent. Primary risks are privacy and operational: broad Gmail access, writing sensitive attachments to disk with hardcoded/example paths, lack of documented least-privilege OAuth handling, and an unspecified present_files sharing tool that could exfiltrate data depending on runtime. No obfuscation, hardcoded secrets, or network-based exfiltration to unknown domains were observed in the supplied fragments. Recommendations: require least-privilege Gmail scopes, document secure credential handling, avoid hardcoded filesystem paths, validate and antivirus-scan attachments, implement size/time limits when parsing PDFs, and audit present_files behavior before use in production.