afk-claude-telegram-bridge

Warn

Audited by Socket on Mar 18, 2026

1 alert found:

Anomaly
AnomalyLOW
SKILL.md

The skill presents a coherent but high-risk integration: a Telegram-based AFK bridge that installs and runs external binaries via a curl | bash installer, stores bot credentials locally, and enables remote control of Claude Code sessions with tool-call approvals. While the described functionality matches a legitimate productivity/presence feature, the combination of download-execute installation, credential exposure, and cross-process data flow creates significant security concerns. The footprint is disproportionately risky for a skill intended to manage remote tool usage, and the data ingress/egress points (Telegram API, GitHub binaries, local IPC) introduce multiple potential exfiltration and code-injection vectors. Overall assessment: SUSPICIOUS due to dangerous install pattern and credential exposure, with potential for misuse if not strictly sandboxed and auditable.

Confidence: 98%Severity: 72%
Audit Metadata
Analyzed At
Mar 18, 2026, 08:17 PM
Package URL
pkg:socket/skills-sh/gmotyl%2Fafk-claude-telegram-bridge-skill%2Fafk-claude-telegram-bridge%2F@1a7c379df10198e3223786e610ae1a11575e995f