secondme-init
Audited by Socket on Feb 22, 2026
1 alert found:
Security[Skill Scanner] URL with free hosting platform or high-abuse TLD detected All findings: [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] [HIGH] supply_chain: URL with free hosting platform or high-abuse TLD detected (SC007) [AITech 9.1.4] This skill is a project-initializer that interactively collects OAuth and database credentials and writes them to a local state.json and a CLAUDE.md documentation file. Functionality and requested permissions are consistent with its stated purpose. The primary security issue is safe handling of sensitive data: client_secret and database connection strings are stored on disk and could be accidentally committed to source control if the user fails to add .secondme/ to .gitignore. There are no signs of credential exfiltration, remote downloads, or obfuscated/malicious code in the provided fragment. LLM verification: The provided initialization skill is consistent with its stated purpose: collecting OAuth credentials and database connection details to generate local configuration and documentation files. There is no evidence of malicious code, remote exfiltration, or execution. Primary security concern: plaintext persistence of sensitive secrets (client_secret, database_url) in .secondme/state.json; mitigation depends on user following the recommendation to gitignore that directory or using a secret store. R