video-presentation-maker

Warn

Audited by Socket on Feb 24, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
fluxa-wallet/SKILL.md

[Skill Scanner] URL with free hosting platform or high-abuse TLD detected All findings: [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] The skill's documentation and command set are consistent with a delegated-wallet/payment CLI and the requested credentials and flows are plausible for that purpose. However, security concerns remain: the core logic lives in a bundled JS executable (scripts/fluxa-cli.bundle.js) that is not shown or signed, environment variables can be overridden to point at arbitrary endpoints, and examples instruct copying and submitting sensitive JSON and tokens. These factors create a meaningful supply-chain and credential-forwarding risk. I classify this as SUSPICIOUS / VULNERABLE (not confirmed malware). Recommended actions before trust: review/verify the contents of scripts/fluxa-cli.bundle.js (source, signatures, and exact network calls), avoid setting WALLET_API/AGENT_ID_API to untrusted URLs, treat AGENT_TOKEN/JWT as high-value secrets, and require user confirmation before any network operation that transmits credentials or initiates payments. LLM verification: The skill's documented purpose (allowing an AI agent to make payments, payouts, and payment links via a local CLI) is coherent with its capabilities. However, because it enables irreversible financial operations and relies on environment-stored credentials and a bundled CLI (not included in this review), it represents a meaningful supply-chain and operational risk. There is no direct evidence of malicious code in the provided documentation, but the absence of the actual CLI source prevents a ful

Confidence: 75%Severity: 75%
SecurityMEDIUM
SKILL.md

[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] [HIGH] data_exfiltration: Outbound data post or form upload via curl/wget detected (NW002) [AITech 8.2.3] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] Selected report presents a plausible, feature-rich pay-per-use PPT/image/video generation workflow but carries elevated supply-chain and data-handling risks due to external monetization gateways and autonomous orchestration. Recommend implementing explicit user consent prompts for external calls, validating domains, encrypting and protecting local state files (prompts.json, generation_state.json), least-privilege access for payment tokens, and clear data-handling/privacy policies before use. If these controls cannot be established, treat as Suspicious to High-Risk and consider redesign or hardening of the workflow. LLM verification: The skill fragment presents a comprehensive, albeit high-risk, pay-per-use workflow for generating PPT-like assets with external APIs. It is not inherently malicious but relies on opaque third-party services and automated payments, which elevates supply-chain, data, and financial risks. Treat as SUSPICIOUS to HIGH risk pending strict controls: explicit per-action user confirmations for charges, verifiable and auditable endpoints, secure handling of prompts and content, and clear data-handling po

Confidence: 90%Severity: 75%
Audit Metadata
Analyzed At
Feb 24, 2026, 04:12 AM
Package URL
pkg:socket/skills-sh/FluxA-Agent-Payment%2Fskills%2Fvideo-presentation-maker%2F@fb406f2b3a34d185abe4ff1ded9a498884e8726a