temps-mcp-setup

Warn

Audited by Socket on Mar 1, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The integration instructions are functionally coherent but present notable supply-chain and credential-exposure risks. The main issues are recommending unpinned runtime execution via npx -y and advising storing the TEMPS_API_KEY in plaintext client JSON files. There is no direct evidence of active malware in the provided text, but the recommended workflow makes credential exfiltration feasible if the @temps-sdk/mcp package or its dependencies are compromised. Recommended mitigations: pin package versions (npx @temps-sdk/mcp@x.y.z), verify checksums or signatures when possible, use short-lived least-privilege API keys, avoid storing secrets in plaintext config (use OS keychain or inject at runtime), and prefer installing and auditing the package before use or running it in an isolated runtime.

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Mar 1, 2026, 06:50 PM
Package URL
pkg:socket/skills-sh/gotempsh%2Ftemps%2Ftemps-mcp-setup%2F@818c993ed791efc03f485c8b783c46777ae8f79c