egghead-slack
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThis skill is a clearly documented, private Slack intelligence integration with legitimate-sounding purpose: passive monitoring and backfill of messages/files for a single user. It does not contain obfuscated or obviously malicious code patterns in the provided fragment (no download-and-execute, no remote installers, no hidden network endpoints). However, it centralizes very high-privilege credentials (a Slack user token with admin and files read access and a bot token that can send messages) and documents many private workspace and channel identifiers. That combination makes the skill a high-value target: compromise of the host, the secrets store, or the indexing destination would allow large-scale data exfiltration of private Slack messages and files. The primary security concerns are over-privileged scopes, sensitive identifiers stored in skill files, and movement of Slack content to an external index without documented access controls. I assess this as not overtly malicious in intent but moderately to highly risky in practice and recommend minimizing token scopes, using short-lived tokens, encrypting and restricting access to the index and skill files, and adding technical enforcement/auditing for the 'Joel-only' policy.