gog-onboard

Fail

Audited by Socket on Feb 24, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The document is an operational skill for using the 'gog' CLI to control Google Workspace and appears functionally legitimate. It contains no direct code-level malware or obfuscated payloads in the provided text. However, the described operator-mediated setup (pasting client_secret JSON and redirect URLs into chat) and installation via a third‑party Homebrew tap create meaningful supply‑chain and credential-exposure risks. Recommend: never paste client_secret JSON into chat; prefer browser-based OAuth where secrets remain on the user's host, or use short-lived authorization codes only; verify and pin the gog binary (checksums/signatures) before installing; run the binary in a sandboxed environment and audit network calls; minimize OAuth scopes and rotate credentials after use. If these mitigations cannot be enforced, treat the workflow as high-risk.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 24, 2026, 03:27 PM
Package URL
pkg:socket/skills-sh/leto-labs%2Fopenclaw-bootstrap-config%2Fgog-onboard%2F@58c8c0418023d6712a2dd903d23360ea6fcfe275