sendbird
Audited by Socket on Mar 11, 2026
1 alert found:
Obfuscated FileThe skill’s stated purpose (Sendbird integration via Membrane) is coherent with its implemented workflow: it relies on Membrane to handle authentication and API calls, avoiding local credential exposure and avoiding direct credential handling by the user. The primary data flows are through Membrane’s proxy to Sendbird APIs, which is a standard and reasonable pattern for managed integrations. There are no evident suspicious download/execute patterns, no reading of credential files, and no autonomous real-world actions. Overall, the risk posture is low-to-moderate (securityRisk ~0.25-0.40) and considered BENIGN with respect to security threats, assuming Membrane’s security controls are robust and the user follows standard best practices for access control and session management.