secondme-init

Warn

Audited by Socket on Feb 22, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] URL with free hosting platform or high-abuse TLD detected All findings: [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] This skill is a project-initializer that interactively collects OAuth and database credentials and writes them to a local state.json and a CLAUDE.md documentation file. Functionality and requested permissions are consistent with its stated purpose. The primary security issue is safe handling of sensitive data: client_secret and database connection strings are stored on disk and could be accidentally committed to source control if the user fails to add .secondme/ to .gitignore. There are no signs of credential exfiltration, remote downloads, or obfuscated/malicious code in the provided fragment. LLM verification: The provided initialization skill is consistent with its stated purpose: collecting OAuth credentials and database connection details to generate local configuration and documentation files. There is no evidence of malicious code, remote exfiltration, or execution. Primary security concern: plaintext persistence of sensitive secrets (client_secret, database_url) in .secondme/state.json; mitigation depends on user following the recommendation to gitignore that directory or using a secret store. R

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Feb 22, 2026, 10:27 AM
Package URL
pkg:socket/skills-sh/mindverse%2Fsecond-me-skills%2Fsecondme-init%2F@0deb9292c501e0b8e6b2294c5307529f06899917