gmail-invoice-processor

Fail

Audited by Socket on Feb 20, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The package appears to implement described invoice-processing functionality without clear indicators of malicious intent. Primary risks are privacy and operational: broad Gmail access, writing sensitive attachments to disk with hardcoded/example paths, lack of documented least-privilege OAuth handling, and an unspecified present_files sharing tool that could exfiltrate data depending on runtime. No obfuscation, hardcoded secrets, or network-based exfiltration to unknown domains were observed in the supplied fragments. Recommendations: require least-privilege Gmail scopes, document secure credential handling, avoid hardcoded filesystem paths, validate and antivirus-scan attachments, implement size/time limits when parsing PDFs, and audit present_files behavior before use in production.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 20, 2026, 01:43 AM
Package URL
pkg:socket/skills-sh/erafat%2Fskills%2Fgmail-invoice-processor%2F@319c779b1359d7945a2eff937da287006a16315c